Advertisement

Information Systems Security

7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings

  • Sushil Jajodia
  • Chandan Mazumdar
Conference proceedings ICISS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7093)

Table of contents

  1. Front Matter
  2. Invited Papers

    1. Anupam Datta, Jeremiah Blocki, Nicolas Christin, Henry DeYoung, Deepak Garg, Limin Jia et al.
      Pages 1-27
    2. Yan Huang, Chih-hao Shen, David Evans, Jonathan Katz, Abhi Shelat
      Pages 28-48
  3. Regular Papers

    1. Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé
      Pages 72-86
    2. Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia
      Pages 87-101
    3. Puneet Gupta, Scott D. Stoller, Zhongyuan Xu
      Pages 116-130
    4. Federico Maggi, Andrea Bellini, Guido Salvaneschi, Stefano Zanero
      Pages 144-159
    5. Lorenzo Cavallaro, R. Sekar
      Pages 160-174
    6. Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing
      Pages 175-189
    7. Ruchira Naskar, Rajat Subhra Chakraborty
      Pages 190-203
    8. Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
      Pages 204-214
    9. Indivar Gupta, P. K. Saxena
      Pages 215-234
    10. Meilof Veeningen, Benne de Weger, Nicola Zannone
      Pages 235-249
    11. Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci
      Pages 250-264
    12. Anuj S. Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera
      Pages 265-279
    13. Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish
      Pages 280-293
    14. Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty, Sukumar Nandi
      Pages 294-308
    15. Ravi Shankar Yadav, Praveen Likhar, M. Keshava Rao
      Pages 309-321
    16. Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis
      Pages 322-336
    17. Harini Ragavan, Brajendra Panda
      Pages 337-351
    18. Filippo Del Tedesco, Sebastian Hunt, David Sands
      Pages 352-369
  4. Short Papers

    1. Christian Schneider, Jonas Pfoh, Claudia Eckert
      Pages 370-373
    2. Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili
      Pages 374-378
    3. Winfried E. Kühnhauser, Anja Pölck
      Pages 379-382
    4. Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais
      Pages 383-386
  5. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Keywords

data outsourcing drive-by downloads intrusion detection trojans watermarking

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Chandan Mazumdar
    • 2
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Center for Distributed ComputingJadavpur UniversityKolkataIndia

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-25560-1
  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-25559-5
  • Online ISBN 978-3-642-25560-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering