2. ICISS 2006:
Kolkata,
India
Aditya Bagchi, Vijayalakshmi Atluri (Eds.):
Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings.
Lecture Notes in Computer Science 4332 Springer 2006, ISBN 3-540-68962-1 BibTeX
Invited Papers
- Sabrina De Capitani di Vimercati, Pierangela Samarati:
Privacy in the Electronic Society.
1-21
Electronic Edition (link) BibTeX
- Vipin Swarup, Len Seligman, Arnon Rosenthal:
A Data Sharing Agreement Framework.
22-36
Electronic Edition (link) BibTeX
- Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger:
Password Exhaustion: Predicting the End of Password Usefulness.
37-55
Electronic Edition (link) BibTeX
- Kulesh Shanmugasundaram, Nasir D. Memon:
Network Monitoring for Security and Forensics.
56-70
Electronic Edition (link) BibTeX
Data and Application Security
- Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje:
Fairness Strategy for Multilevel Secure Concurrency Control Protocol.
71-85
Electronic Edition (link) BibTeX
- Joachim Biskup, Joerg Parthe:
Optimistic Anonymous Participation in Inter-organizational Workflow Instances.
86-100
Electronic Edition (link) BibTeX
- Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma:
O2O: Virtual Private Organizations to Manage Security Policy Interoperability.
101-115
Electronic Edition (link) BibTeX
- Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel:
Privacy Preserving Web-Based Email.
116-131
Electronic Edition (link) BibTeX
Access Control
Key Management and Security in Wireless Networks
Threat Analysis,
Detection and Recovery
Cryptography and Encryption
Short Papers and Research Reports
- Haibing Lu, Yingjiu Li, Xintao Wu:
Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract).
349-352
Electronic Edition (link) BibTeX
- Anirban Majumdar, Clark D. Thomborson, Stephen Drape:
A Survey of Control-Flow Obfuscations.
353-356
Electronic Edition (link) BibTeX
- Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee:
Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments.
357-360
Electronic Edition (link) BibTeX
- Rajwinder Singh, Navdeep Kaur, Anil Kumar Sarje:
Secure Itineraries Framework for Mobile Agent Systems.
361-364
Electronic Edition (link) BibTeX
- Shyam K. Gupta, Vikram Goyal, Anand Gupta:
Malafide Intension Based Detection of Privacy Violation in Information System.
365-368
Electronic Edition (link) BibTeX
- Shyam K. Gupta, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta:
Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report).
369-372
Electronic Edition (link) BibTeX
- Anirban Sengupta, Mridul Sankar Barik:
Towards a Formal Specification Method for Enterprise Information System Security.
373-376
Electronic Edition (link) BibTeX
- Alex Gurevich, Ehud Gudes:
Recent Research on Privacy Preserving Data Mining.
377-380
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:20:19 2009
by Michael Ley (ley@uni-trier.de)