Information Systems Security : 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings /

Saved in:
Bibliographic Details
Meeting name:ICISS (Conference) (7th : 2011 : Calcutta, India)
Imprint:Berlin ; New York : Springer, ©2011.
Description:1 online resource (xv, 388 pages).
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 7093
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7093.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11076235
Hidden Bibliographic Details
Other authors / contributors:Jajodia, Sushil.
Mazumdar, Chandan.
ISBN:9783642255601
3642255604
9783642255595
Summary:This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security.

MARC

LEADER 00000cam a2200000Ka 4500
001 11076235
005 20170630050119.7
006 m o d
007 cr cnu---unuuu
008 111121s2011 gw ob 101 0 eng d
003 ICU
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d COO  |d VPI  |d WAU  |d UKMGB  |d OCLCQ  |d OCLCF  |d BEDGE  |d DKDLA  |d OCLCQ  |d OCLCO  |d YDXCP  |d NUI  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d NAM  |d OCLCO  |d OCLCA 
016 7 |a 015975137  |2 Uk 
020 |a 9783642255601  |q (electronic bk.) 
020 |a 3642255604  |q (electronic bk.) 
020 |z 9783642255595 
035 |a (OCoLC)761697573 
050 4 |a QA76.9.A25  |b I25 2011 
049 |a MAIN 
111 2 |a ICISS (Conference)  |n (7th :  |d 2011 :  |c Calcutta, India) 
245 1 0 |a Information Systems Security :  |b 7th International Conference, ICISS 2011, Kolkata, India, December 15-19, 2011, proceedings /  |c Sushil Jajodia, Chandan Mazumdar (eds.). 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2011. 
300 |a 1 online resource (xv, 388 pages). 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 7093 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
520 |a This book constitutes the refereed proceedings of the 7th International Conference on Information Systems Security, ICISS 2011, held in Kolkata, India, in December 2011. The 20 revised full papers presented together with 4 short papers and 4 invited papers were carefully reviewed and selected from 105 submissions. The papers are organized in topical sections on access control and authorization, malwares and anomaly detection, crypto and steganographic systems, verification and analysis, wireless and mobile systems security, Web and network security. 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458 
650 0 |a Computer networks  |x Security measures  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101490 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 0 |a Data protection  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102034 
650 7 |a Informatique.  |2 eclas 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Data protection.  |2 fast  |0 (OCoLC)fst00887958 
650 7 |a Authentifikation  |2 gnd 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Datensicherung  |2 gnd 
650 7 |a Informationssystem  |2 gnd 
650 7 |a Kryptoanalyse  |2 gnd 
650 7 |a Privatsphäre  |2 gnd 
650 7 |a Rechnernetz  |2 gnd 
650 7 |a Zugriffskontrolle  |2 gnd 
653 4 |a Data protection 
653 4 |a Data encryption (Computer science) 
653 4 |a Information storage and retrieval systems 
653 4 |a Information Systems 
653 4 |a Systems and Data Security 
653 4 |a Information Storage and Retrieval 
653 4 |a Management of Computing and Information Systems 
653 4 |a Data Encryption 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Jajodia, Sushil.  |0 http://id.loc.gov/authorities/names/nr89003763  |1 http://viaf.org/viaf/44471967 
700 1 |a Mazumdar, Chandan.  |0 http://id.loc.gov/authorities/names/no2005109897  |1 http://viaf.org/viaf/41582855 
830 0 |a Lecture notes in computer science ;  |v 7093. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |u http://link.springer.com/10.1007/978-3-642-25560-1  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i d91e79cb-9743-5546-8d26-625db561df6f  |s c81cf2f2-94ce-5897-a1bc-54b1afc22b6b 
928 |t Library of Congress classification  |a QA76.9.A25 I25 2011  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-642-25560-1  |z SpringerLink  |g ebooks  |i 9886021