Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gollmann, Dieter (Επιμελητής έκδοσης), Meier, Jan (Επιμελητής έκδοσης), Sabelfeld, Andrei (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.
Σειρά:Lecture Notes in Computer Science, 4189
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
  • Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
  • TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
  • Private Information Retrieval Using Trusted Hardware
  • Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components
  • License Transfer in OMA-DRM
  • Enhanced Security Architecture for Music Distribution on Mobile
  • A Formal Model of Access Control for Mobile Interactive Devices
  • Discretionary Capability Confinement
  • Minimal Threshold Closure
  • Reducing the Dependence of SPKI/SDSI on PKI
  • Delegation in Role-Based Access Control
  • Applying a Security Requirements Engineering Process
  • Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
  • A Formal Framework for Confidentiality-Preserving Refinement
  • Timing-Sensitive Information Flow Analysis for Synchronous Systems
  • HBAC: A Model for History-Based Access Control and Its Model Checking
  • From Coupling Relations to Mated Invariants for Checking Information Flow
  • A Linear Logic of Authorization and Knowledge
  • Prêt à Voter with Re-encryption Mixes
  • Secure Key-Updating for Lazy Revocation
  • Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
  • Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
  • Deriving Secrecy in Key Establishment Protocols
  • Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes
  • Conditional Reactive Simulatability
  • SessionSafe: Implementing XSS Immune Session Handling
  • Policy-Driven Memory Protection for Reconfigurable Hardware
  • Privacy-Preserving Queries on Encrypted Data
  • Analysis of Policy Anomalies on Distributed Network Security Setups
  • Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks
  • Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.