Computer Security - ESORICS 2003 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings /

ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing togeth...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Snekkenes, Einar (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Gollmann, Dieter (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2808
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Signature and Access Control Policies for XML Documents
  • Authorization and Access Control in Adaptive Workflows
  • Flexible Regulation of Distributed Coalitions
  • Initiator-Resilient Universally Composable Key Exchange
  • Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing
  • Precisely Answering Multi-dimensional Range Queries without Privacy Breaches
  • Passive Attack Analysis for Connection-Based Anonymity Systems
  • Rapid Mixing and Security of Chaum's Visual Electronic Voting
  • Towards Accountable Management of Privacy and Identity Information
  • A Toolkit for Managing Enterprise Privacy Policies
  • Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
  • Hardware Encapsulation of Security Services
  • A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management
  • Bridging Model-Based and Language-Based Security
  • An On-the-Fly Model-Checker for Security Protocol Analysis
  • Symmetric Authentication within a Simulatable Cryptographic Library
  • An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
  • Visualisation for Intrusion Detection
  • On the Detection of Anomalous System Call Arguments.