


default search action
7th ICISS 2011: Kolkata, India
- Sushil Jajodia

, Chandan Mazumdar:
Information Systems Security - 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, Procedings. Lecture Notes in Computer Science 7093, Springer 2011, ISBN 978-3-642-25559-5
Invited Papers
- Anupam Datta, Jeremiah Blocki

, Nicolas Christin
, Henry DeYoung, Deepak Garg, Limin Jia
, Dilsun Kirli Kaynar, Arunesh Sinha
:
Understanding and Protecting Privacy: Formal Semantics and Principled Audit Mechanisms. 1-27 - Yan Huang, Chih-Hao Shen, David Evans

, Jonathan Katz, Abhi Shelat:
Efficient Secure Computation with Garbled Circuits. 28-48 - William Enck

:
Defending Users against Smartphone Apps: Techniques and Future Directions. 49-70 - Vipul Goyal:

Secure Composition of Cryptographic Protocols. 71
Regular Papers
- Mathieu Jaume, Valérie Viet Triem Tong, Ludovic Mé:

Flow Based Interpretation of Access Control: Detection of Illegal Information Flows. 72-86 - Julien A. Thomas, Frédéric Cuppens, Nora Cuppens-Boulahia:

Consistency Policies for Dynamic Information Systems with Declassification Flows. 87-101 - Ram Krishnan

, Ravi S. Sandhu:
Authorization Policy Specification and Enforcement for Group-Centric Secure Information Sharing. 102-115 - Puneet Gupta, Scott D. Stoller, Zhongyuan Xu:

Abductive Analysis of Administrative Policies in Rule-Based Access Control. 116-130 - Pieter Burghouwt

, Marcel E. M. Spruit, Henk J. Sips:
Towards Detection of Botnet Communication through Social Media by Monitoring User Activity. 131-143 - Federico Maggi

, Andrea Bellini, Guido Salvaneschi
, Stefano Zanero
:
Finding Non-trivial Malware Naming Inconsistencies. 144-159 - Lorenzo Cavallaro

, R. Sekar:
Taint-Enhanced Anomaly Detection. 160-174 - Atanu Basu, Indranil Sengupta, Jamuna Kanta Sing:

Secured Cloud Storage Scheme Using ECC Based Key Management in User Hierarchy. 175-189 - Ruchira Naskar

, Rajat Subhra Chakraborty:
Reversible Image Watermarking through Coordinate Logic Operation Based Prediction. 190-203 - Apurba Das, Subhamoy Maitra, Goutam Paul, Santanu Sarkar

:
Some Combinatorial Results towards State Recovery Attack on RC4. 204-214 - Indivar Gupta, P. K. Saxena:

Distributed Signcryption from Pairings. 215-234 - Meilof Veeningen, Benne de Weger, Nicola Zannone

:
Formal Privacy Analysis of Communication Protocols for Identity Management. 235-249 - Olga Gadyatskaya, Eduardo Lostal, Fabio Massacci

:
Load Time Security Verification. 250-264 - Anuj Shanker Saxena, Mayank Pundir, Vikram Goyal, Debajyoti Bera:

Preserving Location Privacy for Continuous Queries on Known Route. 265-279 - Faraz Ahmed, M. Zubair Rafique, Muhammad Abulaish

:
A Data Mining Framework for Securing 3G Core Network from GTP Fuzzing Attacks. 280-293 - Prithu Banerjee, Mahasweta Mitra, Ferdous A. Barbhuiya, Sandip Chakraborty

, Sukumar Nandi
:
An Efficient Decentralized Rekeying Scheme to Secure Hierarchical Geographic Multicast Routing in Wireless Sensor Networks. 294-308 - Ravi Shankar Yadav, Praveen Likhar, M. Keshava Rao:

SecWEM: A Security Solution for Web Based E-mail. 309-321 - Dimitris Geneiatakis, Georgios Portokalidis

, Angelos D. Keromytis:
A Multilayer Overlay Network Architecture for Enhancing IP Services Availability against DoS. 322-336 - Harini Ragavan, Brajendra Panda:

Mitigation of Malicious Modifications by Insiders in Databases. 337-351 - Filippo Del Tedesco, Sebastian Hunt

, David Sands:
A Semantic Hierarchy for Erasure Policies. 352-369
Short Papers
- Christian A. Schneider, Jonas Pfoh, Claudia Eckert:

A Universal Semantic Bridge for Virtual Machine Introspection. 370-373 - Morteza Noferesti, Mohammad Ali Hadavi, Rasool Jalili:

A Signature-Based Approach of Correctness Assurance in Data Outsourcing Scenarios. 374-378 - Winfried E. Kühnhauser, Anja Pölck:

Towards Access Control Model Engineering. 379-382 - Tanusha S. Nadkarni, Radhesh Mohandas, Alwyn R. Pais

:
IFrandbox - Client Side Protection from Malicious Injected Iframes. 383-386

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














