Advances in Computer Science – ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
Σειρά: | Lecture Notes in Computer Science,
4846 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Speaker: Andrei Sabelfeld
- Dimensions of Declassification in Theory and Practice
- A Static Birthmark of Binary Executables Based on API Call Structure
- Compiling C Programs into a Strongly Typed Assembly Language
- Information Flow Testing
- Large Scale Simulation of Tor:
- Privacy Enhancing Credentials
- Browser Based Agile E-Voting System
- Risk Balance in Exchange Protocols
- Scalable DRM System for Media Portability
- Computational Semantics for Basic Protocol Logic – A Stochastic Approach
- Management Advantages of Object Classification in Role-Based Access Control (RBAC)
- An Integrated Model for Access Control and Information Flow Requirements
- Digital Rights Management Using a Master Control Device
- Invited Speaker: Joshua Guttman
- How to do Things with Cryptographic Protocols
- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming
- Secure Verification of Location Claims with Simultaneous Distance Modification
- Invited Speaker: Kazuhiko Kato
- Modeling and Virtualization for Secure Computing Environments
- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces
- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
- Masquerade Detection Based Upon GUI User Profiling in Linux Systems
- One-Time Receiver Address in IPv6 for Protecting Unlinkability
- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts
- Combining Heterogeneous Classifiers for Network Intrusion Detection
- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments
- On Run-Time Enforcement of Policies
- Static vs Dynamic Typing for Access Control in Pi-Calculus
- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.