Skip to main content
  • Conference proceedings
  • © 2010

Information Systems Security

6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6503)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ICISS: International Conference on Information Systems Security

Conference proceedings info: ICISS 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (18 papers)

  1. Front Matter

  2. Invited Talks

    1. Analyzing Explicit Information Flow

      • Sriram K. Rajamani
      Pages 1-2
    2. WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)

      • V. N. Venkatakrishnan, Prithvi Bisht, Mike Ter Louw, Michelle Zhou, Kalpana Gondi, Karthik Thotta Ganesh
      Pages 3-26
    3. Toward Securely Programming the Internet

      • Andrew C. Myers
      Pages 27-27
    4. Attribution of Malicious Behavior

      • Jonathon Giffin, Abhinav Srivastava
      Pages 28-47
  3. Integrity and Verifiability

    1. Unifying Facets of Information Integrity

      • Arnar Birgisson, Alejandro Russo, Andrei Sabelfeld
      Pages 48-65
    2. Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote Attestation

      • Raghunathan Srinivasan, Partha Dasgupta, Tushar Gohad, Amiya Bhattacharya
      Pages 66-80
    3. Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting Systems

      • Mridul Nandi, Stefan Popoveniuc, Poorvi L. Vora
      Pages 81-95
  4. Web and Data Security

    1. Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and Transformation

      • Michelle Zhou, Prithvi Bisht, V. N. Venkatakrishnan
      Pages 96-110
    2. Coverage Criteria for Automatic Security Testing of Web Applications

      • Thanh Binh Dao, Etsuya Shibayama
      Pages 111-124
    3. A Practical Generic Privacy Language

      • Moritz Y. Becker, Alexander Malkis, Laurent Bussard
      Pages 125-139
    4. Efficient Detection of the Return-Oriented Programming Malicious Code

      • Ping Chen, Xiao Xing, Hao Han, Bing Mao, Li Xie
      Pages 140-155
    5. ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows

      • Steven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, Frank Piessens
      Pages 156-170
  5. Access Control and Auditing

    1. Mining RBAC Roles under Cardinality Constraint

      • Ravi Kumar, Shamik Sural, Arobinda Gupta
      Pages 171-185
    2. Specification of History Based Constraints for Access Control in Conceptual Level

      • Fathiyeh Faghih, Morteza Amini, Rasool Jalili
      Pages 186-200
    3. Abstracting Audit Data for Lightweight Intrusion Detection

      • Wei Wang, Xiangliang Zhang, Georgios Pitsilis
      Pages 201-215
  6. System Security

    1. A Persistent Public Watermarking of Relational Databases

      • Raju Halder, Agostino Cortesi
      Pages 216-230
    2. Security Rules versus Security Properties

      • Mathieu Jaume
      Pages 231-245
    3. Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply Chains

      • Shaoying Cai, Chunhua Su, Yingjiu Li, Robert Deng, Tieyan Li
      Pages 246-260
  7. Back Matter

Other Volumes

  1. Information Systems Security

Editors and Affiliations

  • Computer Sciences Department, University of Wisconsin, Madison, USA

    Somesh Jha

  • Dhirubhai Ambani Institute of Information and Communication Technology, Gujarat, India

    Anish Mathuria

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access