Information Systems Security: 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings

Front Cover
Springer Science & Business Media, Nov 24, 2008 - Business & Economics - 307 pages
The 4th International Conference on Information System Security (ICISS 2007) was held December 16-20, 2008 at the Jawaharlal Nehru Technological Univ- sity (JNTU) in Hyderabad, India. Although this conference is held in India, it is a decidedly international conference, attracting papers from all around the world. This year, there were 81 submissions from 18 di?erent countries. The- nal program contained papers from Australia, Austria, France, Germany, India, Poland, UK, and USA. From the 81 submissions, the Program Committee accepted 15 full papers, 4 short papers, and 2 ongoing research reports. The accepted papers span a wide rangeoftopics, includingaccesscontrol, cryptography, forensics, formalmethods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy. Theconferencefeaturedfourkeynotetalks, withwrittenpapersaccompanying most of them. We would like to thank the speakers Somesh Jha, Basant Rajan, Amit Sahai, and Dawn Song for accepting our invitation to deliver keynotetalks atthis year'sconference.Theconferencewasprecededbytwo daysoftutorials. We would like to thank JNTU for hosting the conference, and EasyChair (http: //www.easychair.org/) for providing conference management services to handle the paper review and selection process. Lastly, we wish to express our deepest thanks to the members of the Program Committee who give their p- sonal free time to perform the often thankless job of reviewing many papers under extremely short deadlines, and to the external reviewers, volunteers and local assistants who made this program a success.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Keynote Address
1
On the Decidability of ModelChecking Information Flow Properties
26
Synthesizing Enforcement Monitors wrt the SafetyProgress
41
Cant Live with Em Cant Live without Em
56
Protocols
68
Complexity of Checking Freshness of Cryptographic Protocols
86
Secure Internet Voting Based on Paper Ballots
102
A Secure RoundBased Timestamping Scheme with Absolute
116
Ongoing Research
154
RealTime Alert Correlation with Type Graphs
173
Incorporation of Application Layer Protocol Syntax into Anomaly
188
A Parallel Architecture for Stateful HighSpeed Intrusion Detection
203
Indexing Multimodal Biometric Databases Using KdTree with Feature
221
Audio Watermarking Based on Quantization in Wavelet Domain
235
The Great Wiping Controversy
243
Optimizing the Block Cipher and Modes of Operations Overhead
258

A Framework for Trustworthy ServiceOriented Computing
124
Revisiting Bluetooth Security
132
A Verification Framework for Temporal RBAC with Role Hierarchy
140
Computing on Encrypted Data Extended Abstract
148
Privacy Management for Facebook
273
HyDRo Hybrid Development of Roles
287
Keynote Address
303
Copyright

Other editions - View all

Common terms and phrases