Information Systems Security

4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings

  • R. Sekar
  • Arun K. Pujari
Conference proceedings ICISS 2008

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5352)

Table of contents

  1. Front Matter
  2. Keynote Address

    1. Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang et al.
      Pages 1-25
  3. Languages and Formal Methods

    1. Deepak D’Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra K. Ramesh, Barbara Sprick
      Pages 26-40
    2. Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier
      Pages 41-55
    3. Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger
      Pages 56-70
  4. Protocols

    1. Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas
      Pages 71-85
    2. Zhiyao Liang, Rakesh M. Verma
      Pages 86-101
    3. Łukasz Nitschke
      Pages 102-115
  5. Short Papers

    1. Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon
      Pages 116-123
    2. Manik Lal Das, Ravi Mukkamala
      Pages 132-139
  6. Keynote Address

    1. Amit Sahai
      Pages 148-153
  7. Ongoing Research

    1. Neelam Verma, Prasanna R. Mishra, Gireesh Pandey
      Pages 154-155
    2. N. R. Sunitha, B. B. Amberker
      Pages 156-157
  8. Keynote Address

    1. R. Smith, C. Estan, S. Jha, I. Siahaan
      Pages 158-172
  9. Intrusion Detection

    1. Gianni Tedesco, Uwe Aickelin
      Pages 173-187
    2. Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck
      Pages 188-202
    3. Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna
      Pages 203-220
  10. Biometrics, Forensics and Steganography

    1. Umarani Jayaraman, Surya Prakash, Phalguni Gupta
      Pages 221-234
    2. Vivekananda Bhat K., Indranil Sengupta, Abhijit Das
      Pages 235-242
    3. Craig Wright, Dave Kleiman, Shyaam Sundhar R.S.
      Pages 243-257
  11. Practical Applications

    1. Enkh-Amgalan Baatarjav, Ram Dantu, Santi Phithakkitnukoon
      Pages 273-286
    2. Ludwig Fuchs, Günther Pernul
      Pages 287-302
  12. Keynote Address

  13. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008.

The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.


biometric bluetooth security complexity computer security decidability model checking privacy secure voting security service-oriented computing

Editors and affiliations

  • R. Sekar
    • 1
  • Arun K. Pujari
    • 2
  1. 1.Department of Computer ScienceStony Brook UniversityStony BrookUSA
  2. 2.Department of Computer and Information SciencesUniversity of HyderabadHyderabadIndia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-89861-0
  • Online ISBN 978-3-540-89862-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Chemical Manufacturing
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment