|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 150 occurrences of 130 keywords
|
|
|
Results
Found 632 publication records. Showing 632 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ernesto Damiani, Sabrina De Capitani di Vimercati, Cristiano Fugazza, Pierangela Samarati |
Extending Context Descriptions in Semantics-Aware Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 162-176, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Navdeep Kaur, Rajwinder Singh, Manoj Misra, Anil Kumar Sarje |
Fairness Strategy for Multilevel Secure Concurrency Control Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 71-85, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
concurrency control, fairness, covert channel, Multilevel secure database systems |
1 | Kulesh Shanmugasundaram, Nasir D. Memon |
Network Monitoring for Security and Forensics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, Second International Conference, ICISS 2006, Kolkata, India, December 19-21, 2006, Proceedings, pp. 56-70, 2006, Springer, 3-540-68962-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Network Security, Network Monitoring, Network Forensics, Synopses |
1 | JoongHyo Oh, KyungKeun Lee, Sang-Jae Moon |
How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 290-303, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Mediated identity-based encryption, Identity revocation, Mediated key agreement protocol, Key escrow |
1 | Sushil Jajodia, Chandan Mazumdar (eds.) |
Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![Springer, 3-540-30706-0 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Sharmistha Bagchi-Sen, JinKyu Lee 0003, H. Raghav Rao, Shambhu J. Upadhyaya |
A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 317-321, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | V. Radha 0001, N. Hemanth Kumar |
EISA - An Enterprise Application Security Solution for Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 164-176, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jian Wang 0038, Lein Harn, Hideki Imai |
Key Management for Multicast Fingerprinting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 191-204, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Subrat Kumar Dash, Krupa Sagar Reddy, Arun K. Pujari |
Episode Based Masquerade Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 251-262, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vishal Vatsa, Shamik Sural, Arun K. Majumdar |
A Game-Theoretic Approach to Credit Card Fraud Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 263-276, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Anirban Sengupta, Aniruddha Mukhopadhyay, Koel Ray, Aveek Guha Roy, Dipankar Aich, Mridul Sankar Barik, Chandan Mazumdar |
A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 328-331, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ashok Kumar Das |
A Key Reshuffling Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 205-216, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vivek Ramachandran, Sukumar Nandi |
Detecting ARP Spoofing: An Active Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 239-250, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Roshni Chatterjee, Moiz A. Saifee, Dipanwita Roy Chowdhury |
Modifications of SHA-0 to Prevent Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 277-289, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mahalingam Ramkumar |
On Broadcast Encryption with Random Key Pre-distribution Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 304-316, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Debdeep Mukhopadhyay, Abhishek Chaudhary, Arvind Nebhnani, Dipanwita Roy Chowdhury |
CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 217-227, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Dibyendu Chakrabarti, Subhamoy Maitra, Bimal K. Roy |
A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 228-238, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Random Merging, Sensor Network, Key Pre-distribution, Combinatorial Design |
1 | Indrakshi Ray, Wei Huang |
Event Detection in Multilevel Secure Active Databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 177-190, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Vijay Varadharajan |
Authorization and Trust Enhanced Security for Distributed Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 1-20, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans |
Protection of Relationships in XML Documents with the XML-BB Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 148-163, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Prem Chand |
Building India as the Destination for Secure Software Development - Next Wave of Opportunities for the ICT Industry. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 49-65, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bruce Christianson, Partha Das Chowdhury, James A. Malcolm |
Auditable Anonymous Delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 66-76, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ernesto Damiani, Marco Anisetti, Valerio Bellandi |
Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 21-35, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Janice Warner, Vijayalakshmi Atluri, Ravi Mukkamala |
An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 134-147, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | N. Subramanian, Pramod S. Pawar, Mayank Bhatnagar, Nihar S. Khedekar, Srinivas Guntupalli, N. Satyanarayana, V. K. Vijaykumar, Praveen D. Ampatt, Rajiv Ranjan, Prasad J. Pandit |
Development of a Comprehensive Intrusion Detection System - Challenges and Approaches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 332-335, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Challenges in IDS, IDS Architecture, IDS Standards |
1 | Weiliang Zhao, Vijay Varadharajan, George Bryan |
Analysis and Modelling of Trust in Distributed Information Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 106-119, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Shince Thomas, Devesh Misra, P. R. Lakshmi Eswari, N. Sarat Chandra Babu |
A Transparent End-to-End Security Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 336-339, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Kevin R. B. Butler, Patrick D. McDaniel |
Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 36-48, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Indrajit Ray, Sudip Chakraborty, Indrakshi Ray |
VTrust: A Trust Management System Based on a Vector Model of Trust. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 91-105, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | JungHoon Ha, Jianying Zhou 0001, Sang-Jae Moon |
A Robust Double Auction Protocol Based on a Hybrid Trust Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 77-90, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jaydev Mishra, Pinakpani Pal, Aditya Bagchi |
SPEAR: Design of a Secured Peer-to-Peer Architecture . ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 322-327, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Jaijit Bhattacharya, S. K. Gupta 0001 |
EPAL Based Privacy Enforcement Using ECA Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, First International Conference, ICISS 2005, Kolkata, India, December 19-21, 2005, Proceedings, pp. 120-133, 2005, Springer, 3-540-30706-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #632 of 632 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7] |
|