default search action
6th ICISS 2010: Gandhinagar, India
- Somesh Jha, Anish Mathuria:
Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010. Proceedings. Lecture Notes in Computer Science 6503, Springer 2010, ISBN 978-3-642-17713-2
Invited Talks
- Sriram K. Rajamani:
Analyzing Explicit Information Flow. 1-2 - V. N. Venkatakrishnan, Prithvi Bisht, Mike Ter Louw, Michelle Zhou, Kalpana Gondi, Karthik Thotta Ganesh:
WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper). 3-26 - Andrew C. Myers:
Toward Securely Programming the Internet. 27 - Jonathon T. Giffin, Abhinav Srivastava:
Attribution of Malicious Behavior. 28-47
Integrity and Verifiability
- Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld:
Unifying Facets of Information Integrity. 48-65 - Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad, Amiya Bhattacharya:
Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation. 66-80 - Mridul Nandi, Stefan Popoveniuc, Poorvi L. Vora:
Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems. 81-95
Web and Data Security
- Michelle Zhou, Prithvi Bisht, V. N. Venkatakrishnan:
Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation. 96-110 - Thanh-Binh Dao, Etsuya Shibayama:
Coverage Criteria for Automatic Security Testing of Web Applications. 111-124 - Moritz Y. Becker, Alexander Malkis, Laurent Bussard:
A Practical Generic Privacy Language. 125-139 - Ping Chen, Xiao Xing, Hao Han, Bing Mao, Li Xie:
Efficient Detection of the Return-Oriented Programming Malicious Code. 140-155 - Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, Frank Piessens:
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows. 156-170
Access Control and Auditing
- Ravi Kumar, Shamik Sural, Arobinda Gupta:
Mining RBAC Roles under Cardinality Constraint. 171-185 - Fathieh Faghih, Morteza Amini, Rasool Jalili:
Specification of History Based Constraints for Access Control in Conceptual Level. 186-200 - Wei Wang, Xiangliang Zhang, Georgios Pitsilis:
Abstracting Audit Data for Lightweight Intrusion Detection. 201-215
System Security
- Raju Halder, Agostino Cortesi:
A Persistent Public Watermarking of Relational Databases. 216-230 - Mathieu Jaume:
Security Rules versus Security Properties. 231-245 - Shaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng, Tieyan Li:
Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains. 246-260
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.