Skip to main content
  • Conference proceedings
  • © 2011

Information Systems Security

7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Proceedings

  • Fast track conference proceedings
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7093)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2011.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Regular Papers

    1. An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks

      • Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty, Sukumar Nandi
      Pages 294-308
    2. SecWEM: A Security Solution for Web Based E-mail

      • Ravi Shankar Yadav, Praveen Likhar, M. Keshava Rao
      Pages 309-321
    3. A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS

      • Dimitris Geneiatakis, Georgios Portokalidis, Angelos D. Keromytis
      Pages 322-336
    4. Mitigation of Malicious Modifications by Insiders in Databases

      • Harini Ragavan, Brajendra Panda
      Pages 337-351
    5. A Semantic Hierarchy for Erasure Policies

      • Filippo Del Tedesco, Sebastian Hunt, David Sands
      Pages 352-369
  2. Short Papers

    1. A Universal Semantic Bridge for Virtual Machine Introspection

      • Christian Schneider, Jonas Pfoh, Claudia Eckert
      Pages 370-373
    2. A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios

      • Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili
      Pages 374-378
    3. Towards Access Control Model Engineering

      • Winfried E. Kühnhauser, Anja Pölck
      Pages 379-382
    4. IFrandbox - Client Side Protection from Malicious Injected Iframes

      • Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais
      Pages 383-386
  3. Back Matter

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011.
The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

Editors and Affiliations

  • Center for Secure Information Systems, George Mason University, Fairfax, USA

    Sushil Jajodia

  • Center for Distributed Computing, Jadavpur University, Kolkata, India

    Chandan Mazumdar

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access