skip to content
Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings Preview this item
ClosePreview this item
Checking...

Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings

Author: David HutchisonTakeo KanadeJosef KittlerJon M KleinbergFriedemann MatternAll authors
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2008.
Series: Lecture notes in computer science, 5352.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Printed edition:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: David Hutchison; Takeo Kanade; Josef Kittler; Jon M Kleinberg; Friedemann Mattern; John C Mitchell; Moni Naor; Oscar Nierstrasz; C Pandu Rangan; Arun K Pujari; R Sekar; Bernhard Steffen; Madhu Sudan; Demetri Terzopoulos; Doug Tygar; Moshe Y Vardi; Gerhard Weikum
ISBN: 9783540898610 3540898611 9783540898627 354089862X
OCLC Number: 759004755
Description: 1 online resource.
Contents: Keynote Address --
BitBlaze: A New Approach to Computer Security via Binary Analysis --
Languages and Formal Methods --
On the Decidability of Model-Checking Information Flow Properties --
Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties --
Implicit Flows: Can't Live with 'Em, Can't Live without 'Em --
Protocols --
A Robust Reputation Scheme for Decentralized Group Management Systems --
Complexity of Checking Freshness of Cryptographic Protocols --
Secure Internet Voting Based on Paper Ballots --
Short Papers --
A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper) --
A Framework for Trustworthy Service-Oriented Computing (Short Paper) --
Revisiting Bluetooth Security (Short Paper) --
A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper) --
Keynote Address --
Computing on Encrypted Data --
Ongoing Research --
Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators --
Proxy Re-signature Schemes --
Keynote Address --
Fast Signature Matching Using Extended Finite Automaton (XFA) --
Intrusion Detection --
Real-Time Alert Correlation with Type Graphs --
Incorporation of Application Layer Protocol Syntax into Anomaly Detection --
A Parallel Architecture for Stateful, High-Speed Intrusion Detection --
Biometrics, Forensics and Steganography --
Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion --
Audio Watermarking Based on Quantization in Wavelet Domain --
Overwriting Hard Drive Data: The Great Wiping Controversy --
Practical Applications --
Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks --
Privacy Management for Facebook --
HyDRo --
Hybrid Development of Roles --
Keynote Address --
The Enlightened Era of Enterprise Security (Invited Talk).
Series Title: Lecture notes in computer science, 5352.
Responsibility: edited by David Hutchison, Takeo Kanade, Josef Kittler, Jon M. Kleinberg, Friedemann Mattern, John C. Mitchell, Moni Naor, Oscar Nierstrasz, C. Pandu Rangan, Bernhard Steffen, Madhu Sudan, Demetri Terzopoulos, Doug Tygar, Moshe Y. Vardi, Gerhard Weikum, R. Sekar, Arun K. Pujari.

Abstract:

Covers the proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India. This book includes such topics as access control, cryptography,  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/759004755> # Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "759004755" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/915357941#Place/berlin_heidelberg> ; # Berlin, Heidelberg
    schema:about <http://experiment.worldcat.org/entity/work/data/915357941#Topic/biometrics> ; # Biometrics
    schema:about <http://id.loc.gov/authorities/subjects/sh85066163> ; # Information storage and retrieval systems
    schema:about <http://experiment.worldcat.org/entity/work/data/915357941#Topic/systems_and_data_security> ; # Systems and Data Security
    schema:about <http://experiment.worldcat.org/entity/work/data/915357941#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://id.worldcat.org/fast/887958> ; # Data protection
    schema:about <http://id.worldcat.org/fast/972781> ; # Information storage and retrieval systems
    schema:about <http://dewey.info/class/004.6/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/915357941#Topic/information_systems> ; # Information Systems
    schema:about <http://id.loc.gov/authorities/subjects/sh85035859> ; # Data protection
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/57063007> ; # Bernhard Steffen
    schema:contributor <http://viaf.org/viaf/61636213> ; # Takeo Kanade
    schema:contributor <http://viaf.org/viaf/114470255> ; # Friedemann Mattern
    schema:contributor <http://viaf.org/viaf/58291480> ; # John C. Mitchell
    schema:contributor <http://viaf.org/viaf/41918393> ; # Josef Kittler
    schema:contributor <http://viaf.org/viaf/32154680> ; # Madhu Sudan
    schema:contributor <http://viaf.org/viaf/38149066394665601007> ; # Doug Tygar
    schema:contributor <http://viaf.org/viaf/10004382> ; # Demetri Terzopoulos
    schema:contributor <http://viaf.org/viaf/32249261> ; # Oscar Nierstrasz
    schema:contributor <http://viaf.org/viaf/33992806> ; # R. Sekar
    schema:contributor <http://viaf.org/viaf/61056672> ; # Arun K. Pujari
    schema:contributor <http://viaf.org/viaf/85212989> ; # C. Pandu Rangan
    schema:contributor <http://viaf.org/viaf/162245894> ; # Gerhard Weikum
    schema:contributor <http://viaf.org/viaf/162691482> ; # Jon M. Kleinberg
    schema:contributor <http://viaf.org/viaf/42887943> ; # Moshe Y. Vardi
    schema:contributor <http://viaf.org/viaf/67527661> ; # Moni Naor
    schema:creator <http://experiment.worldcat.org/entity/work/data/915357941#Person/hutchison_david> ; # David Hutchison
    schema:datePublished "2008" ;
    schema:description "This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications."@en ;
    schema:description "Keynote Address -- BitBlaze: A New Approach to Computer Security via Binary Analysis -- Languages and Formal Methods -- On the Decidability of Model-Checking Information Flow Properties -- Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties -- Implicit Flows: Can't Live with 'Em, Can't Live without 'Em -- Protocols -- A Robust Reputation Scheme for Decentralized Group Management Systems -- Complexity of Checking Freshness of Cryptographic Protocols -- Secure Internet Voting Based on Paper Ballots -- Short Papers -- A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper) -- A Framework for Trustworthy Service-Oriented Computing (Short Paper) -- Revisiting Bluetooth Security (Short Paper) -- A Verification Framework for Temporal RBAC with Role Hierarchy (Short Paper) -- Keynote Address -- Computing on Encrypted Data -- Ongoing Research -- Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators -- Proxy Re-signature Schemes -- Keynote Address -- Fast Signature Matching Using Extended Finite Automaton (XFA) -- Intrusion Detection -- Real-Time Alert Correlation with Type Graphs -- Incorporation of Application Layer Protocol Syntax into Anomaly Detection -- A Parallel Architecture for Stateful, High-Speed Intrusion Detection -- Biometrics, Forensics and Steganography -- Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion -- Audio Watermarking Based on Quantization in Wavelet Domain -- Overwriting Hard Drive Data: The Great Wiping Controversy -- Practical Applications -- Optimizing the Block Cipher and Modes of Operations Overhead at the Link Layer Security Framework in the Wireless Sensor Networks -- Privacy Management for Facebook -- HyDRo -- Hybrid Development of Roles -- Keynote Address -- The Enlightened Era of Enterprise Security (Invited Talk)."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/915357941> ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/915357941#CreativeWork/> ;
    schema:name "Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings"@en ;
    schema:productID "759004755" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/759004755#PublicationEvent/berlin_heidelberg_springer_berlin_heidelberg_2008> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/915357941#Agent/springer_berlin_heidelberg> ; # Springer Berlin Heidelberg
    schema:url <http://dx.doi.org/10.1007/978-3-540-89862-7> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-540-89861-0> ;
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-540-89861-0> ;
    schema:workExample <http://worldcat.org/isbn/9783540898610> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-540-89862-7> ;
    schema:workExample <http://worldcat.org/isbn/9783540898627> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/759004755> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/915357941#Agent/springer_berlin_heidelberg> # Springer Berlin Heidelberg
    a bgn:Agent ;
    schema:name "Springer Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/915357941#Person/hutchison_david> # David Hutchison
    a schema:Person ;
    schema:familyName "Hutchison" ;
    schema:givenName "David" ;
    schema:name "David Hutchison" ;
    .

<http://experiment.worldcat.org/entity/work/data/915357941#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
    schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/915357941#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357941#Topic/information_systems> # Information Systems
    a schema:Intangible ;
    schema:name "Information Systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/915357941#Topic/systems_and_data_security> # Systems and Data Security
    a schema:Intangible ;
    schema:name "Systems and Data Security"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85035859> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85066163> # Information storage and retrieval systems
    a schema:Intangible ;
    schema:name "Information storage and retrieval systems"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://id.worldcat.org/fast/887958> # Data protection
    a schema:Intangible ;
    schema:name "Data protection"@en ;
    .

<http://id.worldcat.org/fast/972781> # Information storage and retrieval systems
    a schema:Intangible ;
    schema:name "Information storage and retrieval systems"@en ;
    .

<http://viaf.org/viaf/10004382> # Demetri Terzopoulos
    a schema:Person ;
    schema:familyName "Terzopoulos" ;
    schema:givenName "Demetri" ;
    schema:name "Demetri Terzopoulos" ;
    .

<http://viaf.org/viaf/114470255> # Friedemann Mattern
    a schema:Person ;
    schema:familyName "Mattern" ;
    schema:givenName "Friedemann" ;
    schema:name "Friedemann Mattern" ;
    .

<http://viaf.org/viaf/162245894> # Gerhard Weikum
    a schema:Person ;
    schema:familyName "Weikum" ;
    schema:givenName "Gerhard" ;
    schema:name "Gerhard Weikum" ;
    .

<http://viaf.org/viaf/162691482> # Jon M. Kleinberg
    a schema:Person ;
    schema:familyName "Kleinberg" ;
    schema:givenName "Jon M." ;
    schema:name "Jon M. Kleinberg" ;
    .

<http://viaf.org/viaf/32154680> # Madhu Sudan
    a schema:Person ;
    schema:familyName "Sudan" ;
    schema:givenName "Madhu" ;
    schema:name "Madhu Sudan" ;
    .

<http://viaf.org/viaf/32249261> # Oscar Nierstrasz
    a schema:Person ;
    schema:familyName "Nierstrasz" ;
    schema:givenName "Oscar" ;
    schema:name "Oscar Nierstrasz" ;
    .

<http://viaf.org/viaf/33992806> # R. Sekar
    a schema:Person ;
    schema:familyName "Sekar" ;
    schema:givenName "R." ;
    schema:name "R. Sekar" ;
    .

<http://viaf.org/viaf/38149066394665601007> # Doug Tygar
    a schema:Person ;
    schema:familyName "Tygar" ;
    schema:givenName "Doug" ;
    schema:name "Doug Tygar" ;
    .

<http://viaf.org/viaf/41918393> # Josef Kittler
    a schema:Person ;
    schema:familyName "Kittler" ;
    schema:givenName "Josef" ;
    schema:name "Josef Kittler" ;
    .

<http://viaf.org/viaf/42887943> # Moshe Y. Vardi
    a schema:Person ;
    schema:familyName "Vardi" ;
    schema:givenName "Moshe Y." ;
    schema:name "Moshe Y. Vardi" ;
    .

<http://viaf.org/viaf/57063007> # Bernhard Steffen
    a schema:Person ;
    schema:familyName "Steffen" ;
    schema:givenName "Bernhard" ;
    schema:name "Bernhard Steffen" ;
    .

<http://viaf.org/viaf/58291480> # John C. Mitchell
    a schema:Person ;
    schema:familyName "Mitchell" ;
    schema:givenName "John C." ;
    schema:name "John C. Mitchell" ;
    .

<http://viaf.org/viaf/61056672> # Arun K. Pujari
    a schema:Person ;
    schema:familyName "Pujari" ;
    schema:givenName "Arun K." ;
    schema:name "Arun K. Pujari" ;
    .

<http://viaf.org/viaf/61636213> # Takeo Kanade
    a schema:Person ;
    schema:familyName "Kanade" ;
    schema:givenName "Takeo" ;
    schema:name "Takeo Kanade" ;
    .

<http://viaf.org/viaf/67527661> # Moni Naor
    a schema:Person ;
    schema:familyName "Naor" ;
    schema:givenName "Moni" ;
    schema:name "Moni Naor" ;
    .

<http://viaf.org/viaf/85212989> # C. Pandu Rangan
    a schema:Person ;
    schema:familyName "Pandu Rangan" ;
    schema:givenName "C." ;
    schema:name "C. Pandu Rangan" ;
    .

<http://worldcat.org/entity/work/data/915357941#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/759004755> ; # Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
    .

<http://worldcat.org/isbn/9783540898610>
    a schema:ProductModel ;
    schema:isbn "3540898611" ;
    schema:isbn "9783540898610" ;
    .

<http://worldcat.org/isbn/9783540898627>
    a schema:ProductModel ;
    schema:isbn "354089862X" ;
    schema:isbn "9783540898627" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/759004755> ; # Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/759004755>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/759004755> ; # Information Systems Security : 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings
    schema:dateModified "2018-01-15" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.