This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. The 20 revised full papers and five short papers presented together with four invited papers and three ongoing project summaries were carefully reviewed and selected from 79 submissions. The papers discuss in depth the current state of the research and practice in information systems security.At this point, there are three ways to proceed, ainsert a gap in S1 sequence and move down the matrixa, ainsert a gap in ... A fraud detection system embedded in credit card transaction processing should not adversely affect the response time.
|Title||:||Information Systems Security|
|Author||:||Aditya Bagchi, Vijayalakshmi Atluri|
|Publisher||:||Springer - 2006-11-28|