Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2006.
|
Σειρά: | Lecture Notes in Computer Science,
4189 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
- Private Information Retrieval Using Trusted Hardware
- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components
- License Transfer in OMA-DRM
- Enhanced Security Architecture for Music Distribution on Mobile
- A Formal Model of Access Control for Mobile Interactive Devices
- Discretionary Capability Confinement
- Minimal Threshold Closure
- Reducing the Dependence of SPKI/SDSI on PKI
- Delegation in Role-Based Access Control
- Applying a Security Requirements Engineering Process
- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
- A Formal Framework for Confidentiality-Preserving Refinement
- Timing-Sensitive Information Flow Analysis for Synchronous Systems
- HBAC: A Model for History-Based Access Control and Its Model Checking
- From Coupling Relations to Mated Invariants for Checking Information Flow
- A Linear Logic of Authorization and Knowledge
- Prêt à Voter with Re-encryption Mixes
- Secure Key-Updating for Lazy Revocation
- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
- Deriving Secrecy in Key Establishment Protocols
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes
- Conditional Reactive Simulatability
- SessionSafe: Implementing XSS Immune Session Handling
- Policy-Driven Memory Protection for Reconfigurable Hardware
- Privacy-Preserving Queries on Encrypted Data
- Analysis of Policy Anomalies on Distributed Network Security Setups
- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks
- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.