Computer Security – ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Biskup, Joachim (Επιμελητής έκδοσης), López, Javier (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4734
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Lecture
  • Trustworthy Services and the Biological Analogy
  • Security Architecture and Secure Components I
  • Security of Multithreaded Programs by Compilation
  • Efficient Proving for Practical Distributed Access-Control Systems
  • Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
  • Access Control I
  • Pragmatic XML Access Control Using Off-the-Shelf RDBMS
  • Conditional Privacy-Aware Role Based Access Control
  • Satisfiability and Resiliency in Workflow Systems
  • Applied Cryptography I
  • Completeness of the Authentication Tests
  • SilentKnock: Practical, Provably Undetectable Authentication
  • Generalized Key Delegation for Hierarchical Identity-Based Encryption
  • Change-Impact Analysis of Firewall Policies
  • Fragmentation and Encryption to Enforce Privacy in Data Storage
  • Information Confinement, Privacy, and Security in RFID Systems
  • Formal Methods in Security I
  • A Logic for State-Modifying Authorization Policies
  • Inductive Proofs of Computational Secrecy
  • What, Indeed, Is Intransitive Noninterference?
  • Traceability and Integrity of Execution in Distributed Workflow Management Systems
  • Dynamic Information Flow Control Architecture for Web Applications
  • Cloak: A Ten-Fold Way for Reliable Covert Communications
  • Applied Cryptography II
  • Efficient Password-Based Authenticated Key Exchange Without Public Information
  • Improved Anonymous Timed-Release Encryption
  • Encryption Techniques for Secure Database Outsourcing
  • Access Control II
  • Click Passwords Under Investigation
  • Graphical Password Authentication Using Cued Click Points
  • Obligations and Their Interaction with Programs
  • Applied Cryptography III
  • On the Privacy of Concealed Data Aggregation
  • Synthesizing Secure Protocols
  • A Cryptographic Model for Branching Time Security Properties – The Case of Contract Signing Protocols
  • Security Architecture and Secure Components II
  • Security Evaluation of Scenarios Based on the TCG’s TPM Specification
  • Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods
  • Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links
  • Towards Modeling Trust Based Decisions: A Game Theoretic Approach
  • Extending the Common Services of eduGAIN with a Credential Conversion Service
  • Incorporating Temporal Capabilities in Existing Key Management Schemes
  • A Policy Language for Distributed Usage Control
  • Countering Statistical Disclosure with Receiver-Bound Cover Traffic
  • Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
  • Formal Methods in Security III
  • Modular Access Control Via Strategic Rewriting
  • On the Automated Correction of Security Protocols Susceptible to a Replay Attack
  • Adaptive Soundness of Static Equivalence.