Computer Security - ESORICS 2005 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings /
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12-14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
Edición: | 1st ed. 2005. |
Colección: | Security and Cryptology ;
3679 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Computerized Voting Machines: A View from the Trenches
- XML Access Control with Policy Matching Tree
- Semantic Access Control Model: A Formal Specification
- A Generic XACML Based Declarative Authorization Scheme for Java
- Specification and Validation of Authorisation Constraints Using UML and OCL
- Unified Index for Mobile Object Data and Authorizations
- On Obligations
- A Practical Voter-Verifiable Election Scheme
- Machine-Checked Security Proofs of Cryptographic Signature Schemes
- Sanitizable Signatures
- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts
- Towards a Theory of Intrusion Detection
- On Scalability and Modularisation in the Modelling of Network Security Systems
- Sybil-Resistant DHT Routing
- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
- Quantifying Probabilistic Information Flow in Computational Reactive Systems
- Enforcing Non-safety Security Policies with Program Monitors
- Soundness of Formal Encryption in the Presence of Key-Cycles
- Privacy Preserving Clustering
- Abstractions Preserving Parameter Confidentiality
- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
- Security Notions for Disk Encryption
- Local View Attack on Anonymous Communication
- Browser Model for Security Analysis of Browser-Based Protocols.