The SCEAS System
Navigation Menu

Conferences in DBLP

International Conference on Information Systems Security (iciss)
2006 (conf/iciss/2006)

  1. Sabrina De Capitani di Vimercati, Pierangela Samarati
    Privacy in the Electronic Society. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:1-21 [Conf]
  2. Vipin Swarup, Len Seligman, Arnon Rosenthal
    A Data Sharing Agreement Framework. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:22-36 [Conf]
  3. Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel, Trent Jaeger
    Password Exhaustion: Predicting the End of Password Usefulness. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:37-55 [Conf]
  4. Kulesh Shanmugasundaram, Nasir D. Memon
    Network Monitoring for Security and Forensics. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:56-70 [Conf]
  5. Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje
    Fairness Strategy for Multilevel Secure Concurrency Control Protocol. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:71-85 [Conf]
  6. Joachim Biskup, Joerg Parthe
    Optimistic Anonymous Participation in Inter-organizational Workflow Instances. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:86-100 [Conf]
  7. Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma
    O2O: Virtual Private Organizations to Manage Security Policy Interoperability. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:101-115 [Conf]
  8. Kevin R. B. Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel
    Privacy Preserving Web-Based Email. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:116-131 [Conf]
  9. Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
    Context-Aware Provisional Access Control. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:132-146 [Conf]
  10. Indrakshi Ray, Mahendra Kumar, Lijun Yu
    LRBAC: A Location-Aware Role-Based Access Control Model. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:147-161 [Conf]
  11. Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati
    Extending Context Descriptions in Semantics-Aware Access Control. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:162-176 [Conf]
  12. N. V. Narendra Kumar, R. K. Shyamasundar
    Specification and Realization of Access Control in SPKI/SDSI. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:177-193 [Conf]
  13. Mounita Saha, Dipanwita Roy Chowdhury
    Design of Key Establishment Protocol Using One-Way Functions to Avert insider-replay Attack. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:194-204 [Conf]
  14. Praveen Kumar Vadnala, Anish Mathuria
    An Efficient Key Assignment Scheme for Access Control in a Hierarchy. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:205-219 [Conf]
  15. Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa
    Adaptation of IEEE 802.1X for Secure Session Establishment Between Ethernet Peers. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:220-234 [Conf]
  16. L. Chaithanya, M. P. Singh, M. M. Gore
    Secure Data Management in Reactive Sensor Networks. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:235-248 [Conf]
  17. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl
    Security Ontology: Simulating Threats to Corporate Assets. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:249-259 [Conf]
  18. Amlan Kundu, Shamik Sural, Arun K. Majumdar
    Two-Stage Credit Card Fraud Detection Using Sequence Alignment. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:260-275 [Conf]
  19. D. Krishna Sandeep Reddy, Subrat Kumar Dash, Arun K. Pujari
    New Malicious Code Detection Using Variable Length n-grams. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:276-288 [Conf]
  20. Wanyu Zang, Meng Yu
    A Dead-Lock Free Self-healing Algorithm for Distributed Transactional Processes. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:289-302 [Conf]
  21. Hossein Ghodosi
    An Efficient Public Key Cryptosystem Secure Against Chosen Ciphertext Attack. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:303-314 [Conf]
  22. Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna
    A Partial Image Encryption Method with Pseudo Random Sequences. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:315-325 [Conf]
  23. Hyeran Lee, Kyung Hyune Rhee
    High Capacity Lossless Data Hiding. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:326-336 [Conf]
  24. Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan
    An Implementation and Evaluation of Online Disk Encryption for Windows Systems. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:337-348 [Conf]
  25. Haibing Lu, Yingjiu Li, Xintao Wu
    Disclosure Risk in Dynamic Two-Dimensional Contingency Tables (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:349-352 [Conf]
  26. Anirban Majumdar, Clark D. Thomborson, Stephen Drape
    A Survey of Control-Flow Obfuscations. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:353-356 [Conf]
  27. Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee
    Filtering Out Unfair Recommendations for Trust Model in Ubiquitous Environments. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:357-360 [Conf]
  28. Rajwinder Singh, Navdeep Kaur, Anil Kumar Sarje
    Secure Itineraries Framework for Mobile Agent Systems. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:361-364 [Conf]
  29. Shyam K. Gupta, Vikram Goyal, Anand Gupta
    Malafide Intension Based Detection of Privacy Violation in Information System. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:365-368 [Conf]
  30. Shyam K. Gupta, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta
    Design and Development of Malafide Intension Based Privacy Violation Detection System (An Ongoing Research Report). [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:369-372 [Conf]
  31. Anirban Sengupta, Mridul Sankar Barik
    Towards a Formal Specification Method for Enterprise Information System Security. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:373-376 [Conf]
  32. Alex Gurevich, Ehud Gudes
    Recent Research on Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    ICISS, 2006, pp:377-380 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002