Computer Security - ESORICS 2004 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Samarati, Pierangela (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Ryan, Peter (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Gollmann, Dieter (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Molva, Refik (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Έκδοση:1st ed. 2004.
Σειρά:Lecture Notes in Computer Science, 3193
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Incorporating Dynamic Constraints in the Flexible Authorization Framework
  • Access-Condition-Table-Driven Access Control for XML Databases
  • An Algebra for Composing Enterprise Privacy Policies
  • Deriving, Attacking and Defending the GDOI Protocol
  • Better Privacy for Trusted Computing Platforms
  • A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
  • A Formalization of Anonymity and Onion Routing
  • Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
  • Comparison Between Two Practical Mix Designs
  • Signature Bouquets: Immutability for Aggregated/Condensed Signatures
  • Towards a Theory of Data Entanglement
  • Portable and Flexible Document Access Control Mechanisms
  • Possibilistic Information Flow Control in the Presence of Encrypted Communication
  • Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
  • Security Property Based Administrative Controls
  • A Vector Model of Trust for Developing Trustworthy Systems
  • Parameterized Authentication
  • Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
  • Hindering Eavesdropping via IPv6 Opportunistic Encryption
  • On the Role of Key Schedules in Attacks on Iterated Ciphers
  • A Public-Key Encryption Scheme with Pseudo-random Ciphertexts
  • A Host Intrusion Prevention System for Windows Operating Systems
  • Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table
  • ARCHERR: Runtime Environment Driven Program Safety
  • Sets, Bags, and Rock and Roll
  • Redundancy and Diversity in Security
  • Discovering Novel Attack Strategies from INFOSEC Alerts.