Computer Security – ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings /
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These...
Corporate Author: | |
---|---|
Other Authors: | , , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2005.
|
Series: | Lecture Notes in Computer Science,
3679 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Computerized Voting Machines: A View from the Trenches
- XML Access Control with Policy Matching Tree
- Semantic Access Control Model: A Formal Specification
- A Generic XACML Based Declarative Authorization Scheme for Java
- Specification and Validation of Authorisation Constraints Using UML and OCL
- Unified Index for Mobile Object Data and Authorizations
- On Obligations
- A Practical Voter-Verifiable Election Scheme
- Machine-Checked Security Proofs of Cryptographic Signature Schemes
- Sanitizable Signatures
- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts
- Towards a Theory of Intrusion Detection
- On Scalability and Modularisation in the Modelling of Network Security Systems
- Sybil-Resistant DHT Routing
- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
- Quantifying Probabilistic Information Flow in Computational Reactive Systems
- Enforcing Non-safety Security Policies with Program Monitors
- Soundness of Formal Encryption in the Presence of Key-Cycles
- Privacy Preserving Clustering
- Abstractions Preserving Parameter Confidentiality
- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
- Security Notions for Disk Encryption
- Local View Attack on Anonymous Communication
- Browser Model for Security Analysis of Browser-Based Protocols.