Cargando…

Computer Security - ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings /

Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12-14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: De Capitani di Vimercati, Sabrina (Editor ), Syverson, Paul (Editor ), Gollmann, Dieter (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3679
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Computerized Voting Machines: A View from the Trenches
  • XML Access Control with Policy Matching Tree
  • Semantic Access Control Model: A Formal Specification
  • A Generic XACML Based Declarative Authorization Scheme for Java
  • Specification and Validation of Authorisation Constraints Using UML and OCL
  • Unified Index for Mobile Object Data and Authorizations
  • On Obligations
  • A Practical Voter-Verifiable Election Scheme
  • Machine-Checked Security Proofs of Cryptographic Signature Schemes
  • Sanitizable Signatures
  • Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
  • Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
  • Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
  • Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
  • An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts
  • Towards a Theory of Intrusion Detection
  • On Scalability and Modularisation in the Modelling of Network Security Systems
  • Sybil-Resistant DHT Routing
  • Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
  • Quantifying Probabilistic Information Flow in Computational Reactive Systems
  • Enforcing Non-safety Security Policies with Program Monitors
  • Soundness of Formal Encryption in the Presence of Key-Cycles
  • Privacy Preserving Clustering
  • Abstractions Preserving Parameter Confidentiality
  • Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
  • Security Notions for Disk Encryption
  • Local View Attack on Anonymous Communication
  • Browser Model for Security Analysis of Browser-Based Protocols.