Information Systems Security

Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006. Proceedings

  • Aditya Bagchi
  • Vijayalakshmi Atluri
Conference proceedings ICISS 2006

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4332)

Table of contents

  1. Front Matter
  2. Invited Papers

    1. Sabrina De Capitani di Vimercati, Pierangela Samarati
      Pages 1-21
    2. Vipin Swarup, Len Seligman, Arnon Rosenthal
      Pages 22-36
    3. Luke St. Clair, Lisa Johansen, William Enck, Matthew Pirretti, Patrick Traynor, Patrick McDaniel et al.
      Pages 37-55
    4. Kulesh Shanmugasundaram, Nasir Memon
      Pages 56-70
  3. Data and Application Security

    1. Navdeep Kaur, Rajwinder Singh, Manoj Misra, A. K. Sarje
      Pages 71-85
    2. Frédéric Cuppens, Nora Cuppens-Boulahia, Céline Coma
      Pages 101-115
    3. Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor, Patrick McDaniel
      Pages 116-131
  4. Access Control

    1. Amir Reza Masoumzadeh, Morteza Amini, Rasool Jalili
      Pages 132-146
    2. Indrakshi Ray, Mahendra Kumar, Lijun Yu
      Pages 147-161
    3. E. Damiani, S. De Capitani di Vimercati, C. Fugazza, P. Samarati
      Pages 162-176
    4. N. V. Narendra Kumar, R. K. Shyamasundar
      Pages 177-193
  5. Key Management and Security in Wireless Networks

    1. Praveen Kumar Vadnala, Anish Mathuria
      Pages 205-219
    2. Purificación Sáiz, Jon Matías, Eduardo Jacob, Javier Bustamante, Armando Astarloa
      Pages 220-234
    3. L. Chaithanya, M. P. Singh, M. M. Gore
      Pages 235-248
  6. Threat Analysis, Detection and Recovery

    1. Andreas Ekelhart, Stefan Fenz, Markus D. Klemen, Edgar R. Weippl
      Pages 249-259
    2. Amlan Kundu, Shamik Sural, A. K. Majumdar
      Pages 260-275
    3. D. Krishna Sandeep Reddy, Subrat Kumar Dash, Arun K. Pujari
      Pages 276-288
  7. Cryptography and Encryption

    1. Y. V. Subba Rao, Abhijit Mitra, S. R. Mahadeva Prasanna
      Pages 315-325
    2. Hyeran Lee, Kyunghyune Rhee
      Pages 326-336
    3. Vartika Singh, D. R. Lakshminarasimhaiah, Yogesh Mishra, Chitra Viswanathan, G. Athithan
      Pages 337-348
  8. Short Papers and Research Reports

    1. Anirban Majumdar, Clark Thomborson, Stephen Drape
      Pages 353-356
    2. Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Koo Lee, Heejo Lee
      Pages 357-360
    3. Rajwinder Singh, Navdeep Kaur, A. K. Sarje
      Pages 361-364
    4. Shyam K. Gupta, Vikram Goyal, Anand Gupta
      Pages 365-368
    5. Shyam K. Gupta, Vikram Goyal, Bholi Patra, Sankalp Dubey, Anand Gupta
      Pages 369-372
    6. Anirban Sengupta, Mridul Sankar Barik
      Pages 373-376
    7. Alex Gurevich, Ehud Gudes
      Pages 377-380
  9. Back Matter

About these proceedings


Alignment Code Ethernet Information RSA cryptosystem access control authorization broadcast encryption interoperability networks organization privacy security storage security trust

Editors and affiliations

  • Aditya Bagchi
    • 1
  • Vijayalakshmi Atluri
    • 2
  1. 1.Indian Statistical InstituteComputer and Statistical Service CenterKolkataIndia
  2. 2.MSIS Department and CIMICRutgers UniversityUSA

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-68962-1
  • Online ISBN 978-3-540-68963-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site