Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings /

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Vimercati, Sabrina de Capitani di (Επιμελητής έκδοσης), Syverson, Paul (Επιμελητής έκδοσης), Gollmann, Dieter (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3679
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Computerized Voting Machines: A View from the Trenches
  • XML Access Control with Policy Matching Tree
  • Semantic Access Control Model: A Formal Specification
  • A Generic XACML Based Declarative Authorization Scheme for Java
  • Specification and Validation of Authorisation Constraints Using UML and OCL
  • Unified Index for Mobile Object Data and Authorizations
  • On Obligations
  • A Practical Voter-Verifiable Election Scheme
  • Machine-Checked Security Proofs of Cryptographic Signature Schemes
  • Sanitizable Signatures
  • Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
  • Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
  • Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
  • Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
  • An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts
  • Towards a Theory of Intrusion Detection
  • On Scalability and Modularisation in the Modelling of Network Security Systems
  • Sybil-Resistant DHT Routing
  • Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
  • Quantifying Probabilistic Information Flow in Computational Reactive Systems
  • Enforcing Non-safety Security Policies with Program Monitors
  • Soundness of Formal Encryption in the Presence of Key-Cycles
  • Privacy Preserving Clustering
  • Abstractions Preserving Parameter Confidentiality
  • Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
  • Security Notions for Disk Encryption
  • Local View Attack on Anonymous Communication
  • Browser Model for Security Analysis of Browser-Based Protocols.