Eleventh International Conference on Information Systems Security
(ICISS 2015)
16-20 December 2015, Jadavpur University, Kolkata, India
http://www.iciss.org.in

REGISTRATION

 

 

 

 

CONTACT US

 

 

 

Proceedings being published as LNCS 9478

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

SPONSORS

ADVANCE PROGRAM

Programme Schedule

Venue: Dr. T. Sen Auditorium, Jadavpur University, Kolkata, India

Conference Programme   (Regular Paper: 20+5 min; Short Paper: 10+5 min)

December 18, 2015, Friday

8:00 – 9:00

Registration

09:00-10:00

Inauguration

10:00-11:00

Keynote Talk – I

STEFANO PARABOSCHI, Professor, Department of Industrial Engineering and Management, Information and Production - DIGIP, University of Bergamo, Italy

Title:-  Extending Mandatory Access Control Policies in Android

11:00-11:30 Tea / Coffee Break

11:30-13:00

Technical Session – I; Crypto-Systems and Protocols-I

 

•Nishant Sharma, Dr. Somitra Sanadhya and Dr. Donghoon Chang, “New HMAC Message Patches: Secret Patch and CrOw Patch”

 

• Haruhisa Kosuge, Hidema Tanaka, Keisuke Iwai and Takakazu Kurokawa, “Search Algorithm of Precise Integral Distinguisher of Byte-based Block Cipher”

 

Dhruti Sharma and Devesh Jinwala, “Functional Encryption In IoT E-Health Care System”

 

• Y. Sreenivasa Rao, “Privacy Preserving Decentralized Key-Policy Attribute Based Encryption with Fast Decryption” (Short Paper)

 

13:00-14:30

Lunch Break

14:30-15:30

Keynote Talk – II

PIERANGELA SAMARATI, Professor, Department of Computer Science of the Universita' degli Studi di Milano, Crema, Italy

Title:-  Data Security and Privacy in the Cloud

15:30-15:45 Tea / Coffee Break

15:45-17:15

Technical Session – II; Sensor Networks and Cognitive Radio

 

• Sarita Agrawal, Manik Lal Das, Anish Mathuria and Sanjay Srivastava, “Program Integrity Verification for Detecting Node Capture Attack in Wireless Sensor Network”


• Suchismita Bhattacharjee and Ningrinla Marchang, “Attack-Resistant Trust-based Weighted Majority Game Rule for Spectrum sensing in Cognitive Radio Networks”

 

• Satyajit Banerjee, Debapriyay Mukhopadhyay and Suman Roy, “A New Threshold Certification Scheme Based Defense Against Sybil Attack For Sensor Networks” (Short Paper)

 

• Toshanlal Meenpal and Anup Bhattacharjee, “Watermark Removal Attack extended to Forgery against Correlation-based Watermarking Schemes”

 

17:30-18:15

Business meeting

18:30-20:00

Cultural Programme - "VISTAR" presents a Musical Evening with Sitar, Sarod and Tabla at Dr. T. Sen Auditorium, Jadavpur University, Kolkata, India

 

December 19, 2015, Saturday

8:30 – 9:30

Registration

9:30–10:30

Keynote Talk – III

VINCENZO PIURI, Professor, Università degli Studi di Milano, Italy

Title:-  Biometric Technologies and Systems for Automated Border Control Gates

10:30-10:55 Tea / Coffee Break

10:55-13:00

Technical Session – III; Access Control

 

• Prasuna Sarana, Arindam Roy, Shamik Sural, Jaideep Vaidya and Vijay Atluri, “Role Mining in the Presence of Separation of Duty Constraints”

 

• Sadhana Jha, Shamik Sural, Vijay Atluri and Jaideep Vaidya, “Enforcing Separation of Duty in Attribute based Access Control Systems”

 

• Simon Gansel, Stephan Schnitzer, Ahmad Gilbeau-Hammoud, Viktor Friesen, Frank Dürr, Kurt Rothermel, Christian Maihöfer and Ulrich Krämer, “Context-aware Access Control in Novel Automotive HMI Systems”

 

• Michael Kunz, Ludwig Fuchs, Matthias Hummer and Günther Pernul, “Introducing Dynamic Identity and Access Management in Organizations”

 

• Phillipa Bennett and Indrakshi Ray, “Modeling of Online Social Network Policies using an Attribute-Based Access Control Framework”

 

13:00-14:30

Lunch Break

14:30–15:30

Keynote Talk – IV

VINOD GANAPATHY, Associate Professor, Rutgers University, USA

Title:-  Reflections on the Self-service Cloud Computing Project

15:30-15:45 Tea / Coffee Break

15:45-17:30

Technical Session – IV; Attacks and Mitigation

  

• Tom Deering, Ganesh Ram Santhanam and Suresh Kothari, “FlowMiner: Automatic Summarization of Library Data-Flow for Malware Analysis”


• Punit Mehta, Jigar Sharda and Manik Lal Das, “SQLshield: Preventing SQL injection attacks by modifying user input data”


• Erwan Godefroy, Eric Totel, Michel Hurfin and Frederic Majorczyk, “Assessment of an Automatic Correlation Rules Generator”


• Stefan Prandl, Mihai Lazarescu and Duc-Son Pham, “A Study of Web Application Firewall Solutions” (Short Paper)


• Moumita Das, Bhaskar Sardar and Ansuman Banerjee, “Attacks on Branch Predictors: An Empirical Exploration” (Short Paper)

 

19:00 onwards

Banquet Dinner at The Gateway Hotel, Ball Room

 

December 20, 2015, Sunday

8:30 – 9:00

Registration

9:00-10:15

Technical Session – V; Cloud Security

 

• Anant Pushkar, Nirnay Ghosh and Soumya Ghosh, “A Statistical Approach to Detect Anomalous User Requests in SaaS Cloud-centric Collaborations”

 

• Gaurav Somani, Abhinav Johri, Mohit Taneja, Utkarsh Pyne, Manoj Gaur and Dheeraj Sanghi, “DARAC: DDoS Mitigation using DDoS Aware Resource Allocation in Cloud”

 

• Yanhuang Li, Nora Cuppens-Boulahia, Jean-Michel Crom, Frédéric Cuppens, Vincent Frey and Xiaoshu Ji, “Similarity Measure for Security Policies in Service Provider Selection”

 

10:15-10:30 Tea / Coffee Break

10:30-11:35

Technical Session – VI; Watermarking and Steganography

 
• Aniket Roy, Rajat Subhra Chakraborty and Ruchira Naskar, “Reversible Color Image Watermarking in the YCoCg-R Color Space”

 

• Imon Mukherjee, Biswajita Datta, Reeturaj Banerjee and Srijan Das, “DWT Difference Modulation Based Novel Steganographic Algorithm” (Short Paper)

 

• Goutam Paul, “Revisiting Democratic Mining in Bitcoins: Its Weakness and Possible Remedies”

 

11:35-12:30

Technical Session – VII; Information Flow Control and Biometrics

 

• Dominik Bollmann, Steffen Lortz, Heiko Mantel and Artem Starostin, “An Automatic Inference of Minimal Security Types”


• Radhey Shyam and Yogendra Narain Singh, “Robustness of Score Normalization in Multibiometric Systems” (Short Paper)

 

• Susheel S, Naren N and Shyamasundar R.K., “Enforcing Secure Data Sharing in Web Application Development Frameworks like Django Through Information Flow Control” (Short Paper)

 

12:30-14:00 Lunch Break

14:00-15:55

Technical Session – VIII; Crypto-Systems and Protocols-II

 

• Angsuman Das and Avishek Adhikari, “Plaintext Checkable Signcryption”


• Santanu Sarkar, “A New Distinguisher on Grain v1 for 106 rounds”

 

• Ashish Choudhury, “Asynchronous Error-decodable Secret-sharing and Its Applications”

 

• Payal Chaudhari, Manik Lal Das and Anish Mathuria, “On Anonymous Attribute Based Encryption”

 

• Shyamalendu Kandar and Bibhas Chandra Dhara, “A (k,n) Multi Secret sharing scheme using two variables one way function with less public values” (Short Paper)

 

16:00-16:30

Farewell Snacks

 

 
 

SRISP © All Rights Reserved