Computer Security -- ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings /
This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009. The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, inform...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2009.
|
Edición: | 1st ed. 2009. |
Colección: | Security and Cryptology ;
5789 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Network Security I
- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
- User-Centric Handling of Identity Agent Compromise
- The Coremelt Attack
- Type-Based Analysis of PIN Processing APIs
- Declassification with Explicit Reference Points
- Tracking Information Flow in Dynamic Tree Structures
- Network Security II
- Lightweight Opportunistic Tunneling (LOT)
- Hide and Seek in Time - Robust Covert Timing Channels
- Authentic Time-Stamps for Archival Storage
- Towards a Theory of Accountability and Audit
- Reliable Evidence: Auditability by Typing
- PCAL: Language Support for Proof-Carrying Authorization Systems
- Network Security III
- ReFormat: Automatic Reverse Engineering of Encrypted Messages
- Protocol Normalization Using Attribute Grammars
- Automatically Generating Models for Botnet Detection
- Dynamic Enforcement of Abstract Separation of Duty Constraints
- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging
- Requirements and Protocols for Inference-Proof Interactions in Information Systems
- A Privacy Preservation Model for Facebook-Style Social Network Systems
- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing
- Secure Pseudonymous Channels
- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
- Content Delivery Networks: Protection or Threat?
- Model-Checking DoS Amplification for VoIP Session Initiation
- The Wisdom of Crowds: Attacks and Optimal Constructions
- Secure Evaluation of Private Linear Branching Programs with Medical Applications
- Keep a Few: Outsourcing Data While Maintaining Confidentiality
- Data Structures with Unpredictable Timing
- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
- Corruption-Localizing Hashing
- Isolating JavaScript with Filters, Rewriting, and Wrappers
- An Effective Method for Combating Malicious Scripts Clickbots
- Client-Side Detection of XSS Worms by Monitoring Payload Propagation
- Formal Indistinguishability Extended to the Random Oracle Model
- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
- A Generic Security API for Symmetric Key Management on Cryptographic Devices
- ID-Based Secure Distance Bounding and Localization
- Secure Ownership and Ownership Transfer in RFID Systems
- Cumulative Attestation Kernels for Embedded Systems
- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries
- Set Covering Problems in Role-Based Access Control.