Advertisement

Information Systems Security

11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015. Proceedings

  • Sushil Jajoda
  • Chandan Mazumdar
Conference proceedings ICISS 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9478)

Also part of the Security and Cryptology book sub series (LNSC, volume 9478)

Table of contents

  1. Front Matter
    Pages I-XVI
  2. Invited Talks

    1. Front Matter
      Pages 1-1
    2. Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati
      Pages 3-10
    3. Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza
      Pages 11-20
    4. Stefano Paraboschi, Enrico Bacis, Simone Mutti
      Pages 21-35
  3. Access Control

    1. Front Matter
      Pages 59-59
    2. Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya
      Pages 61-78
    3. Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
      Pages 98-117
    4. Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel et al.
      Pages 118-138
    5. Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul
      Pages 139-158
  4. Attacks and Mitigation

    1. Front Matter
      Pages 159-159
    2. Tom Deering, Ganesh Ram Santhanam, Suresh Kothari
      Pages 171-191
    3. Punit Mehta, Jigar Sharda, Manik Lal Das
      Pages 192-206
    4. E. Godefroy, E. Totel, M. Hurfin, F. Majorczyk
      Pages 207-224
  5. Cloud Security

    1. Front Matter
      Pages 225-225
    2. Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji
      Pages 227-242
    3. Gaurav Somani, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi
      Pages 263-282
  6. Crypto Systems and Protocols

    1. Front Matter
      Pages 283-283
    2. Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma
      Pages 285-302
    3. Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa
      Pages 303-323
    4. Angsuman Das, Avishek Adhikari
      Pages 324-333
    5. Santanu Sarkar
      Pages 334-344
    6. Dhruti Sharma, Devesh Jinwala
      Pages 345-363
    7. Payal Chaudhari, Manik Lal Das, Anish Mathuria
      Pages 378-392
  7. Information Flow Control

    1. Front Matter
      Pages 393-393
    2. Dominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin
      Pages 395-415
  8. Sensor Networks and Cognitive Radio

    1. Front Matter
      Pages 417-417
    2. Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava
      Pages 419-440
  9. Watermarking and Steganography

    1. Front Matter
      Pages 461-461
    2. Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar
      Pages 480-498
  10. Short Papers

    1. Front Matter
      Pages 499-499
    2. Stefan Prandl, Mihai Lazarescu, Duc-Son Pham
      Pages 501-510
    3. Moumita Das, Bhaskar Sardar, Ansuman Banerjee
      Pages 511-520
    4. Radhey Shyam, Yogendra Narain Singh
      Pages 542-550
    5. Satyajit Banerjee, Debapriyay Mukhopadhyay, Suman Roy
      Pages 562-572
    6. Imon Mukherjee, Biswajita Datta, Reeturaj Banerjee, Srijan Das
      Pages 573-582
  11. Back Matter
    Pages 583-584

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 11th International Conference on Information Systems Security, ICISS 2015, held in Kolkata, India, in December 2015.

The 24 revised full papers and 8 short papers presented together with 4 invited papers were carefully reviewed and selected from 133 submissions. The papers address the following topics: access control; attacks and mitigation; cloud security; crypto systems and protocols; information flow control; sensor networks and cognitive radio; and watermarking and steganography.

Keywords

Access control Biometric Cloud security Cryptography Watermarking Anonymity Bitcoins Cryptanalysis Cyber attacks Denial of service attack Digital watermarking Electronic cash system Information flow control Internet of things Protocols Security Sensor networks Steganography User privacy Web security

Editors and affiliations

  • Sushil Jajoda
    • 1
  • Chandan Mazumdar
    • 2
  1. 1.Center for Secure Information SystemsFairfaxUSA
  2. 2.Jadavpur UniversityKolkataIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-26961-0
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-26960-3
  • Online ISBN 978-3-319-26961-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace
Engineering