default search action
11th ICISS 2015: Kolkata, India
- Sushil Jajodia, Chandan Mazumdar:
Information Systems Security - 11th International Conference, ICISS 2015, Kolkata, India, December 16-20, 2015, Proceedings. Lecture Notes in Computer Science 9478, Springer 2015, ISBN 978-3-319-26960-3
Invited Talks
- Sabrina De Capitani di Vimercati, Sara Foresti, Pierangela Samarati:
Data Security Issues in Cloud Scenarios. 3-10 - Ruggero Donida Labati, Angelo Genovese, Enrique Muñoz Ballester, Vincenzo Piuri, Fabio Scotti, Gianluca Sforza:
Automated Border Control Systems: Biometric Challenges and Research Trends. 11-20 - Stefano Paraboschi, Enrico Bacis, Simone Mutti:
Extending Mandatory Access Control Policies in Android. 21-35 - Vinod Ganapathy:
Reflections on the Self-service Cloud Computing Project. 36-57
Access Control
- Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya:
Enforcing Separation of Duty in Attribute Based Access Control Systems. 61-78 - Phillipa Bennett, Indrakshi Ray, Robert B. France:
Modeling of Online Social Network Policies Using an Attribute-Based Access Control Framework. 79-97 - Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Role Mining in the Presence of Separation of Duty Constraints. 98-117 - Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer, Ulrich Krämer:
Context-Aware Access Control in Novel Automotive HMI Systems. 118-138 - Michael Kunz, Ludwig Fuchs, Matthias Hummer, Günther Pernul:
Introducing Dynamic Identity and Access Management in Organizations. 139-158
Attacks and Mitigation
- Goutam Paul:
Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies. 161-170 - Tom Deering, Ganesh Ram Santhanam, Suresh C. Kothari:
FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis. 171-191 - Punit Mehta, Jigar Sharda, Manik Lal Das:
SQLshield: Preventing SQL Injection Attacks by Modifying User Input Data. 192-206 - Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk:
Assessment of an Automatic Correlation Rules Generator. 207-224
Cloud Security
- Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey, Xiaoshu Ji:
Similarity Measure for Security Policies in Service Provider Selection. 227-242 - Anant Pushkar, Nirnay Ghosh, Soumya K. Ghosh:
A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-Centric Collaborations. 243-262 - Gaurav Somani, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Singh Gaur, Dheeraj Sanghi:
DARAC: DDoS Mitigation Using DDoS Aware Resource Allocation in Cloud. 263-282
Crypto Systems and Protocols
- Donghoon Chang, Somitra Kumar Sanadhya, Nishant Sharma:
New HMAC Message Patches: Secret Patch and CrOw Patch. 285-302 - Haruhisa Kosuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa:
Search Algorithm of Precise Integral Distinguisher of Byte-Based Block Cipher. 303-323 - Angsuman Das, Avishek Adhikari:
Plaintext Checkable Signcryption. 324-333 - Santanu Sarkar:
A New Distinguisher on Grain v1 for 106 Rounds. 334-344 - Dhruti Sharma, Devesh Jinwala:
Functional Encryption in IoT E-Health Care System. 345-363 - Ashish Choudhury:
Asynchronous Error-Decodable Secret-Sharing and Its Application. 364-377 - Payal Chaudhari, Manik Lal Das, Anish Mathuria:
On Anonymous Attribute Based Encryption. 378-392
Information Flow Control
- Dominik Bollmann, Steffen Lortz, Heiko Mantel, Artem Starostin:
An Automatic Inference of Minimal Security Types. 395-415
Sensor Networks and Cognitive Radio
- Sarita Agrawal, Manik Lal Das, Anish Mathuria, Sanjay Srivastava:
Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network. 419-440 - Suchismita Bhattacharjee, Ningrinla Marchang:
Attack-Resistant Trust-Based Weighted Majority Game Rule for Spectrum Sensing in Cognitive Radio Networks. 441-460
Watermarking and Steganography
- Toshanlal Meenpal, A. K. Bhattacharjee:
Watermark Removal Attack Extended to Forgery Against Correlation-Based Watermarking Schemes. 463-479 - Aniket Roy, Rajat Subhra Chakraborty, Ruchira Naskar:
Reversible Color Image Watermarking in the YCoCg-R Color Space. 480-498
Short Papers
- Stefan Prandl, Mihai M. Lazarescu, Duc-Son Pham:
A Study of Web Application Firewall Solutions. 501-510 - Moumita Das, Bhaskar Sardar, Ansuman Banerjee:
Attacks on Branch Predictors: An Empirical Exploration. 511-520 - Y. Sreenivasa Rao:
Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Schemes with Fast Decryption. 521-531 - Shyamalendu Kandar, Bibhas Chandra Dhara:
A (k, n) Multi Secret Sharing Scheme Using Two Variable One Way Function with Less Public Values. 532-541 - Radhey Shyam, Yogendra Narain Singh:
Robustness of Score Normalization in Multibiometric Systems. 542-550 - S. Susheel, N. V. Narendra Kumar, R. K. Shyamasundar:
Enforcing Secure Data Sharing in Web Application Development Frameworks Like Django Through Information Flow Control. 551-561 - Satyajit Banerjee, Debapriyay Mukhopadhyay, Suman Roy:
A New Threshold Certification Scheme Based Defense Against Sybil Attack for Sensor Networks. 562-572 - Imon Mukherjee, Biswajita Datta, Reeturaj Banerjee, Srijan Das:
DWT Difference Modulation Based Novel Steganographic Algorithm. 573-582
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.