Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Cervesato, Iliano (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Lecture Notes in Computer Science, 4846
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Speaker: Andrei Sabelfeld
  • Dimensions of Declassification in Theory and Practice
  • A Static Birthmark of Binary Executables Based on API Call Structure
  • Compiling C Programs into a Strongly Typed Assembly Language
  • Information Flow Testing
  • Large Scale Simulation of Tor:
  • Privacy Enhancing Credentials
  • Browser Based Agile E-Voting System
  • Risk Balance in Exchange Protocols
  • Scalable DRM System for Media Portability
  • Computational Semantics for Basic Protocol Logic – A Stochastic Approach
  • Management Advantages of Object Classification in Role-Based Access Control (RBAC)
  • An Integrated Model for Access Control and Information Flow Requirements
  • Digital Rights Management Using a Master Control Device
  • Invited Speaker: Joshua Guttman
  • How to do Things with Cryptographic Protocols
  • A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
  • An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming
  • Secure Verification of Location Claims with Simultaneous Distance Modification
  • Invited Speaker: Kazuhiko Kato
  • Modeling and Virtualization for Secure Computing Environments
  • Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces
  • A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
  • Masquerade Detection Based Upon GUI User Profiling in Linux Systems
  • One-Time Receiver Address in IPv6 for Protecting Unlinkability
  • A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts
  • Combining Heterogeneous Classifiers for Network Intrusion Detection
  • Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments
  • On Run-Time Enforcement of Policies
  • Static vs Dynamic Typing for Access Control in Pi-Calculus
  • A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.