Cargando…

Computer Security -- ESORICS 2009 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings /

This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009. The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, inform...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Backes, Michael (Editor ), Ning, Peng (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5789
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Network Security I
  • Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
  • User-Centric Handling of Identity Agent Compromise
  • The Coremelt Attack
  • Type-Based Analysis of PIN Processing APIs
  • Declassification with Explicit Reference Points
  • Tracking Information Flow in Dynamic Tree Structures
  • Network Security II
  • Lightweight Opportunistic Tunneling (LOT)
  • Hide and Seek in Time - Robust Covert Timing Channels
  • Authentic Time-Stamps for Archival Storage
  • Towards a Theory of Accountability and Audit
  • Reliable Evidence: Auditability by Typing
  • PCAL: Language Support for Proof-Carrying Authorization Systems
  • Network Security III
  • ReFormat: Automatic Reverse Engineering of Encrypted Messages
  • Protocol Normalization Using Attribute Grammars
  • Automatically Generating Models for Botnet Detection
  • Dynamic Enforcement of Abstract Separation of Duty Constraints
  • Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging
  • Requirements and Protocols for Inference-Proof Interactions in Information Systems
  • A Privacy Preservation Model for Facebook-Style Social Network Systems
  • New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing
  • Secure Pseudonymous Channels
  • Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
  • Content Delivery Networks: Protection or Threat?
  • Model-Checking DoS Amplification for VoIP Session Initiation
  • The Wisdom of Crowds: Attacks and Optimal Constructions
  • Secure Evaluation of Private Linear Branching Programs with Medical Applications
  • Keep a Few: Outsourcing Data While Maintaining Confidentiality
  • Data Structures with Unpredictable Timing
  • WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
  • Corruption-Localizing Hashing
  • Isolating JavaScript with Filters, Rewriting, and Wrappers
  • An Effective Method for Combating Malicious Scripts Clickbots
  • Client-Side Detection of XSS Worms by Monitoring Payload Propagation
  • Formal Indistinguishability Extended to the Random Oracle Model
  • Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
  • Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
  • A Generic Security API for Symmetric Key Management on Cryptographic Devices
  • ID-Based Secure Distance Bounding and Localization
  • Secure Ownership and Ownership Transfer in RFID Systems
  • Cumulative Attestation Kernels for Embedded Systems
  • Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries
  • Set Covering Problems in Role-Based Access Control.