The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information Systems Security (iciss)
2005 (conf/iciss/2005)

  1. Vijay Varadharajan
    Authorization and Trust Enhanced Security for Distributed Applications. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:1-20 [Conf]
  2. Ernesto Damiani, Marco Anisetti, Valerio Bellandi
    Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:21-35 [Conf]
  3. Kevin R. B. Butler, Patrick Drew McDaniel
    Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:36-48 [Conf]
  4. Prem Chand
    Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:49-65 [Conf]
  5. Bruce Christianson, Partha Das Chowdhury, James A. Malcolm
    Auditable Anonymous Delegation. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:66-76 [Conf]
  6. JungHoon Ha, Jianying Zhou, Sang-Jae Moon
    A Robust Double Auction Protocol Based on a Hybrid Trust Model. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:77-90 [Conf]
  7. Indrajit Ray, Sudip Chakraborty, Indrakshi Ray
    VTrust: A Trust Management System Based on a Vector Model of Trust. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:91-105 [Conf]
  8. Weiliang Zhao, Vijay Varadharajan, George Bryan
    Analysis and Modelling of Trust in Distributed Information Systems. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:106-119 [Conf]
  9. Jaijit Bhattacharya, S. K. Gupta
    EPAL Based Privacy Enforcement Using ECA Rules. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:120-133 [Conf]
  10. Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala
    An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:134-147 [Conf]
  11. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans
    Protection of Relationships in XML Documents with the XML-BB Model. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:148-163 [Conf]
  12. V. Radha, N. Hemanth Kumar
    EISA - An Enterprise Application Security Solution for Databases. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:164-176 [Conf]
  13. Indrakshi Ray, Wei Huang
    Event Detection in Multilevel Secure Active Databases. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:177-190 [Conf]
  14. Jian Wang, Lein Harn, Hideki Imai
    Key Management for Multicast Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:191-204 [Conf]
  15. Ashok Kumar Das
    A Key Reshuffling Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:205-216 [Conf]
  16. Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury
    CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:217-227 [Conf]
  17. Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy
    A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:228-238 [Conf]
  18. Vivek Ramachandran, Sukumar Nandi
    Detecting ARP Spoofing: An Active Technique. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:239-250 [Conf]
  19. Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari
    Episode Based Masquerade Detection. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:251-262 [Conf]
  20. Vishal Vatsa, Shamik Sural, Arun K. Majumdar
    A Game-Theoretic Approach to Credit Card Fraud Detection. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:263-276 [Conf]
  21. Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury
    Modifications of SHA-0 to Prevent Attacks. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:277-289 [Conf]
  22. JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon
    How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:290-303 [Conf]
  23. Mahalingam Ramkumar
    On Broadcast Encryption with Random Key Pre-distribution Schemes. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:304-316 [Conf]
  24. Sharmistha Bagchi-Sen, Jinkyu Lee, H. Raghav Rao, Shambhu J. Upadhyaya
    A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field . [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:317-321 [Conf]
  25. Jaydev Misra, Pinakpani Pal, Aditya Bagchi
    SPEAR: Design of a Secured Peer-to-Peer Architecture . [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:322-327 [Conf]
  26. Anirban Sengupta, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar
    A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security . [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:328-331 [Conf]
  27. N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit
    Development of a Comprehensive Intrusion Detection System - Challenges and Approaches. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:332-335 [Conf]
  28. Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu
    A Transparent End-to-End Security Solution. [Citation Graph (0, 0)][DBLP]
    ICISS, 2005, pp:336-339 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002