Security and Cryptology

Information Systems Security

6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010

Editors: Jha, Somesh, Mathuria, Anish (Eds.)

Free Preview

Buy this book

eBook n/a
  • ISBN 978-3-642-17714-9
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
Softcover n/a
  • ISBN 978-3-642-17713-2
  • Free shipping for individuals worldwide

Table of contents (18 chapters)

Table of contents (18 chapters)
  • Analyzing Explicit Information Flow

    Pages 1-2

    Rajamani, Sriram K.

  • WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)

    Pages 3-26

    Venkatakrishnan, V. N. (et al.)

  • Toward Securely Programming the Internet

    Pages 27-27

    Myers, Andrew C.

  • Attribution of Malicious Behavior

    Pages 28-47

    Giffin, Jonathon (et al.)

  • Unifying Facets of Information Integrity

    Pages 48-65

    Birgisson, Arnar (et al.)

Buy this book

eBook n/a
  • ISBN 978-3-642-17714-9
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
Softcover n/a
  • ISBN 978-3-642-17713-2
  • Free shipping for individuals worldwide

Services for this book

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information Systems Security
Book Subtitle
6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010
Editors
  • Somesh Jha
  • Anish Mathuria
Series Title
Security and Cryptology
Series Volume
6503
Copyright
2010
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer Berlin Heidelberg
eBook ISBN
978-3-642-17714-9
DOI
10.1007/978-3-642-17714-9
Softcover ISBN
978-3-642-17713-2
Edition Number
1
Number of Pages
XIV, 261
Number of Illustrations
60 b/w illustrations
Topics