Information Systems Security: First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, ProceedingsThe 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19 21, 2005 at Jadavpur University, Kolkata, India. The objectives of the conference were to discuss in depth the current state of the research and practice in information systems security, enable participants to bene'tfrompersonalcontactwithotherresearchersandexpandtheirknowledge, and disseminate the research results. This volumecontains 4 invitedpapers,19refereedpapersthat werepresented at the conference, and 5 ongoing project summaries. The refereed papers, which were selected from the 72 submissions, were rigorouslyreviewed by the Program Committee members. The volume provides researcherswith a broad perspective of recent developments in information systems security. A special note of thanks goes to the many volunteers whose e'orts made this conference a success. We wish to thank Prem Chand, Ernesto Damiani, Patrick McDaniel, R. Sekar, and Vijay Varadharajan for agreeing to deliver the invited talks, the authors for their worthy contributions, and the referees for their time and e'ort in reviewing the papers. We are grateful to Arun Majumdar and Aditya Bagchi for serving as the General Chairs. Last, but certainly not least, our thanks go to Vijay Kowtha of the U.S. O'ce ofNaval ResearchGlobal and MichaelCheetham of the INDO-US Science & Technology Forum for providing the generous ?nancial support." |
Contents
Authorization and Trust Enhanced Security for Distributed | 1 |
Toward Exploiting LocationBased and Video Information | 21 |
Understanding Mutable Internet Pathogens or How I Learned to Stop | 36 |
Building India as the Destination for Secure Software | 49 |
Auditable Anonymous Delegation | 66 |
A Trust Management System Based on a Vector Model of Trust | 91 |
Analysis and Modelling of Trust in Distributed Information Systems | 106 |
EPAL Based Privacy Enforcement Using ECA Rules | 120 |
Key Management for Multicast Fingerprinting | 191 |
A Key Reshuffling Scheme for Wireless Sensor Networks | 205 |
A Hybrid Design of Key Predistribution Scheme for Wireless Sensor | 228 |
Episode Based Masquerade Detection | 251 |
Modifications of SHA0 to Prevent Attacks | 277 |
How to Solve Key Escrow and Identity Revocation in IdentityBased | 290 |
On Broadcast Encryption with Random Key Predistribution Schemes | 304 |
A Framework for Examining Skill Specialization Gender Inequity | 317 |
An Attribute Graph Based Approach to Map Local Access Control | 134 |
Protection of Relationships in XML Documents with the XMLBB | 148 |
EISA An Enterprise Application Security Solution for Databases | 164 |
Event Detection in Multilevel Secure Active Databases | 177 |
A WebEnabled Enterprise Security Management Framework Based | 328 |
Author Index | 341 |
Other editions - View all
Common terms and phrases
access control action active database algorithm analysis application approach architecture ARP request ARP spoofing attack attributes authentication block buyers CMEA combinatorial design common key communication components composite event Computer context credentials credit card cryptographic database system database transaction decrypt defined definition differential cryptanalysis domain double auction dynamic engine entities evaluation framework hash host identity identity-based identity-based encryption IEEE implemented India infection Jajodia key distribution key escrow key management key pre-distribution layer LNCS MAC address masquerade Multilevel Secure netscape operation packet parameters parasite primitive events Privacy Policy private key proposed protocol public key query random role rule secret secure software security level sensor networks sensor nodes server share specific strategy subgroup key subset super-peer surrogate T-Box Table technique Technology tion transaction trust management trust relationship Trustworthy Software web services