Information Systems Security: First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings

Front Cover
Springer Science & Business Media, Dec 9, 2005 - Business & Economics - 342 pages
The 1st InternationalConference on Information Systems Security (ICISS 2005) was held December 19 21, 2005 at Jadavpur University, Kolkata, India. The objectives of the conference were to discuss in depth the current state of the research and practice in information systems security, enable participants to bene'tfrompersonalcontactwithotherresearchersandexpandtheirknowledge, and disseminate the research results. This volumecontains 4 invitedpapers,19refereedpapersthat werepresented at the conference, and 5 ongoing project summaries. The refereed papers, which were selected from the 72 submissions, were rigorouslyreviewed by the Program Committee members. The volume provides researcherswith a broad perspective of recent developments in information systems security. A special note of thanks goes to the many volunteers whose e'orts made this conference a success. We wish to thank Prem Chand, Ernesto Damiani, Patrick McDaniel, R. Sekar, and Vijay Varadharajan for agreeing to deliver the invited talks, the authors for their worthy contributions, and the referees for their time and e'ort in reviewing the papers. We are grateful to Arun Majumdar and Aditya Bagchi for serving as the General Chairs. Last, but certainly not least, our thanks go to Vijay Kowtha of the U.S. O'ce ofNaval ResearchGlobal and MichaelCheetham of the INDO-US Science & Technology Forum for providing the generous ?nancial support."
 

Contents

Authorization and Trust Enhanced Security for Distributed
1
Toward Exploiting LocationBased and Video Information
21
Understanding Mutable Internet Pathogens or How I Learned to Stop
36
Building India as the Destination for Secure Software
49
Auditable Anonymous Delegation
66
A Trust Management System Based on a Vector Model of Trust
91
Analysis and Modelling of Trust in Distributed Information Systems
106
EPAL Based Privacy Enforcement Using ECA Rules
120
Key Management for Multicast Fingerprinting
191
A Key Reshuffling Scheme for Wireless Sensor Networks
205
A Hybrid Design of Key Predistribution Scheme for Wireless Sensor
228
Episode Based Masquerade Detection
251
Modifications of SHA0 to Prevent Attacks
277
How to Solve Key Escrow and Identity Revocation in IdentityBased
290
On Broadcast Encryption with Random Key Predistribution Schemes
304
A Framework for Examining Skill Specialization Gender Inequity
317

An Attribute Graph Based Approach to Map Local Access Control
134
Protection of Relationships in XML Documents with the XMLBB
148
EISA An Enterprise Application Security Solution for Databases
164
Event Detection in Multilevel Secure Active Databases
177
A WebEnabled Enterprise Security Management Framework Based
328
Author Index
341
Copyright

Other editions - View all

Common terms and phrases