↓ Skip to main content

Information Systems Security

Overview of attention for book
Cover of 'Information Systems Security'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Authorization and Trust Enhanced Security for Distributed Applications
  3. Altmetric Badge
    Chapter 2 Toward Exploiting Location-Based and Video Information in Negotiated Access Control Policies
  4. Altmetric Badge
    Chapter 3 Understanding Mutable Internet Pathogens, or How I Learned to Stop Worrying and Love Parasitic Behavior
  5. Altmetric Badge
    Chapter 4 Building India as the Destination for Secure Software Development – Next Wave of Opportunities for the ICT Industry
  6. Altmetric Badge
    Chapter 5 Auditable Anonymous Delegation
  7. Altmetric Badge
    Chapter 6 A Robust Double Auction Protocol Based on a Hybrid Trust Model
  8. Altmetric Badge
    Chapter 7 VTrust: A Trust Management System Based on a Vector Model of Trust
  9. Altmetric Badge
    Chapter 8 Analysis and Modelling of Trust in Distributed Information Systems
  10. Altmetric Badge
    Chapter 9 EPAL Based Privacy Enforcement Using ECA Rules
  11. Altmetric Badge
    Chapter 10 An Attribute Graph Based Approach to Map Local Access Control Policies to Credential Based Access Control Policies
  12. Altmetric Badge
    Chapter 11 Protection of Relationships in XML Documents with the XML-BB Model
  13. Altmetric Badge
    Chapter 12 EISA – An Enterprise Application Security Solution for Databases
  14. Altmetric Badge
    Chapter 13 Event Detection in Multilevel Secure Active Databases
  15. Altmetric Badge
    Chapter 14 Key Management for Multicast Fingerprinting
  16. Altmetric Badge
    Chapter 15 A Key Reshuffling Scheme for Wireless Sensor Networks
  17. Altmetric Badge
    Chapter 16 CCMEA: Customized Cellular Message Encryption Algorithm for Wireless Networks
  18. Altmetric Badge
    Chapter 17 A Hybrid Design of Key Pre-distribution Scheme for Wireless Sensor Networks
  19. Altmetric Badge
    Chapter 18 Detecting ARP Spoofing: An Active Technique
  20. Altmetric Badge
    Chapter 19 Episode Based Masquerade Detection
  21. Altmetric Badge
    Chapter 20 A Game-Theoretic Approach to Credit Card Fraud Detection
  22. Altmetric Badge
    Chapter 21 Modifications of SHA-0 to Prevent Attacks
  23. Altmetric Badge
    Chapter 22 How to Solve Key Escrow and Identity Revocation in Identity-Based Encryption Schemes
  24. Altmetric Badge
    Chapter 23 On Broadcast Encryption with Random Key Pre-distribution Schemes
  25. Altmetric Badge
    Chapter 24 A Framework for Examining Skill Specialization, Gender Inequity, and Career Advancement in the Information Security Field
  26. Altmetric Badge
    Chapter 25 SPEAR: Design of a Secured Peer-to-Peer Architecture
  27. Altmetric Badge
    Chapter 26 A Web-Enabled Enterprise Security Management Framework Based on a Unified Model of Enterprise Information System Security
  28. Altmetric Badge
    Chapter 27 Development of a Comprehensive Intrusion Detection System – Challenges and Approaches
  29. Altmetric Badge
    Chapter 28 A Transparent End-to-End Security Solution
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

news
1 news outlet
wikipedia
8 Wikipedia pages

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
8 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Information Systems Security
Published by
Springer Science & Business Media, December 2005
DOI 10.1007/11593980
ISBNs
978-3-54-030706-8, 978-3-54-032422-5
Editors

Jajodia, Sushil, Mazumdar, Chandan

Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 8 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Unknown 8 100%

Demographic breakdown

Readers by professional status Count As %
Student > Bachelor 1 13%
Student > Master 1 13%
Unknown 6 75%
Readers by discipline Count As %
Computer Science 2 25%
Unknown 6 75%