Skip to main content
  • Conference proceedings
  • © 2008

Information Systems Security

4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5352)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2008.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

  2. Keynote Address

    1. BitBlaze: A New Approach to Computer Security via Binary Analysis

      • Dawn Song, David Brumley, Heng Yin, Juan Caballero, Ivan Jager, Min Gyung Kang et al.
      Pages 1-25
  3. Languages and Formal Methods

    1. On the Decidability of Model-Checking Information Flow Properties

      • Deepak D’Souza, Raveendra Holla, Janardhan Kulkarni, Raghavendra K. Ramesh, Barbara Sprick
      Pages 26-40
    2. Synthesizing Enforcement Monitors wrt. the Safety-Progress Classification of Properties

      • Yliès Falcone, Jean-Claude Fernandez, Laurent Mounier
      Pages 41-55
    3. Implicit Flows: Can’t Live with ‘Em, Can’t Live without ‘Em

      • Dave King, Boniface Hicks, Michael Hicks, Trent Jaeger
      Pages 56-70
  4. Protocols

    1. A Robust Reputation Scheme for Decentralized Group Management Systems

      • Frédéric Cuppens, Nora Cuppens-Boulahia, Julien A. Thomas
      Pages 71-85
    2. Complexity of Checking Freshness of Cryptographic Protocols

      • Zhiyao Liang, Rakesh M. Verma
      Pages 86-101
    3. Secure Internet Voting Based on Paper Ballots

      • Łukasz Nitschke
      Pages 102-115
  5. Short Papers

    1. A Secure Round-Based Timestamping Scheme with Absolute Timestamps (Short Paper)

      • Duc-Phong Le, Alexis Bonnecaze, Alban Gabillon
      Pages 116-123
    2. Revisiting Bluetooth Security (Short Paper)

      • Manik Lal Das, Ravi Mukkamala
      Pages 132-139
  6. Keynote Address

    1. Computing on Encrypted Data

      • Amit Sahai
      Pages 148-153
  7. Ongoing Research

    1. Identification of Cryptographically Strong and Weak Pseudorandom Bit Generators

      • Neelam Verma, Prasanna R. Mishra, Gireesh Pandey
      Pages 154-155
    2. Proxy Re-signature Schemes

      • N. R. Sunitha, B. B. Amberker
      Pages 156-157
  8. Keynote Address

    1. Fast Signature Matching Using Extended Finite Automaton (XFA)

      • R. Smith, C. Estan, S. Jha, I. Siahaan
      Pages 158-172
  9. Intrusion Detection

    1. Real-Time Alert Correlation with Type Graphs

      • Gianni Tedesco, Uwe Aickelin
      Pages 173-187
    2. Incorporation of Application Layer Protocol Syntax into Anomaly Detection

      • Patrick Düssel, Christian Gehl, Pavel Laskov, Konrad Rieck
      Pages 188-202
    3. A Parallel Architecture for Stateful, High-Speed Intrusion Detection

      • Luca Foschini, Ashish V. Thapliyal, Lorenzo Cavallaro, Christopher Kruegel, Giovanni Vigna
      Pages 203-220
  10. Biometrics, Forensics and Steganography

    1. Indexing Multimodal Biometric Databases Using Kd-Tree with Feature Level Fusion

      • Umarani Jayaraman, Surya Prakash, Phalguni Gupta
      Pages 221-234

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the refereed proceedings of the 4th International Conference on Information Systems Security, ICISS 2008, held in Hyderabad, India, in December 2008. The 15 revised full papers, 4 short papers, and 2 research reports presented together with 4 keynote talks were carefully reviewed and selected from 81 submissions. The papers span a wide range of topics including access control, cryptography, forensics, formal methods and language-based security, intrusion detection, malware defense, network and Web security, operating system security, and privacy, and are organized in topical sections on languages and formal methods, protocols, ongoing research, intrusion detection, biometrics, forensics and steganography, and practical applications.

Editors and Affiliations

  • Department of Computer Science, Stony Brook University, Stony Brook, USA

    R. Sekar

  • Department of Computer and Information Sciences, University of Hyderabad, Hyderabad, India

    Arun K. Pujari

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access