Skip to main content
  • Conference proceedings
  • © 2014

Information Systems Security

10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8880)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2014.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Invited Talks

    1. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense: Building the Scientific Foundation

      • George Cybenko, Sushil Jajodia, Michael P. Wellman, Peng Liu
      Pages 1-8
    2. SNIPS: A Software-Defined Approach for Scaling Intrusion Prevention Systems via Offloading

      • Victor Heorhiadi, Seyed Kaveh Fayaz, Michael K. Reiter, Vyas Sekar
      Pages 9-29
  3. Contributed Papers

    1. Security Inferences

      1. Extending Dolev-Yao with Assertions
        • R. Ramanujam, Vaishnavi Sundararajan, S. P. Suresh
        Pages 50-68
      2. Inferring Accountability from Trust Perceptions
        • Koen Decroix, Denis Butin, Joachim Jansen, Vincent Naessens
        Pages 69-88
      3. Client Side Web Session Integrity as a Non-interference Property
        • Wilayat Khan, Stefano Calzavara, Michele Bugliesi, Willem De Groef, Frank Piessens
        Pages 89-108
    2. Security Policies

      1. Impact of Multiple <i>t</i>-<i>t</i> SMER Constraints on Minimum User Requirement in RBAC
        • Arindam Roy, Shamik Sural, Arun Kumar Majumdar
        Pages 109-128
      2. Temporal RBAC Security Analysis Using Logic Programming in the Presence of Administrative Policies
        • Sadhana Jha, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri
        Pages 129-148
      3. A Formal Methodology for Modeling Threats to Enterprise Assets
        • Jaya Bhattacharjee, Anirban Sengupta, Chandan Mazumdar
        Pages 149-166
    3. Security User Interfaces

      1. Towards a More Democratic Mining in Bitcoins
        • Goutam Paul, Pratik Sarkar, Sarbajit Mukherjee
        Pages 185-203
      2. Authentication Schemes - Comparison and Effective Password Spaces
        • Peter Mayer, Melanie Volkamer, Michaela Kauer
        Pages 204-225
      3. A Security Extension Providing User Anonymity and Relaxed Trust Requirement in Non-3GPP Access to the EPS
        • Hiten Choudhury, Basav Roychoudhury, Dilip kr. Saikia
        Pages 226-244
      4. A Usage-Pattern Perspective for Privacy Ranking of Android Apps
        • Xiaolei Li, Xinshu Dong, Zhenkai Liang
        Pages 245-256
    4. Security Attacks

      1. Privacy Leakage Attacks in Browsers by Colluding Extensions
        • Anil Saini, Manoj Singh Gaur, Vijay Laxmi, Tushar Singhal, Mauro Conti
        Pages 257-276
      2. CORP: A Browser Policy to Mitigate Web Infiltration Attacks
        • Krishna Chaitanya Telikicherla, Venkatesh Choppella, Bruhadeshwar Bezawada
        Pages 277-297
      3. Catching Classical and Hijack-Based Phishing Attacks
        • Tanmay Thakur, Rakesh Verma
        Pages 318-337
    5. Malware Detection

      1. PMDS: Permission-Based Malware Detection System
        • Paolo Rovelli, Ýmir Vigfússon
        Pages 338-357

Other Volumes

  1. Information Systems Security

About this book

This book constitutes the refereed proceedings of the 10th International Conference on Information Systems Security, ICISS 2014, held in Hyderabad, India, in December 2014. The 20 revised full papers and 5 short papers presented together with 3 invited papers were carefully reviewed and selected from 129 submissions. The papers address the following topics: security inferences; security policies; security user interfaces; security attacks; malware detection; forensics; and location based security services.

Editors and Affiliations

  • Department of EECS, University of Michigan, Ann Arbor, USA

    Atul Prakash

  • Faculty of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai, India

    Rudrapatna Shyamasundar

Bibliographic Information

  • Book Title: Information Systems Security

  • Book Subtitle: 10th International Conference, ICISS 2014, Hyderabad, India, December 16-20, 2014. Proceedings

  • Editors: Atul Prakash, Rudrapatna Shyamasundar

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-13841-1

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-13840-4Published: 20 November 2014

  • eBook ISBN: 978-3-319-13841-1Published: 03 December 2014

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XXIV, 478

  • Number of Illustrations: 163 b/w illustrations

  • Topics: Systems and Data Security, Cryptology, Computer Communication Networks

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access