Custom cover image
Custom cover image

Computer Security ? ESORICS 2006 : 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings / edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld

Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: SpringerLink Bücher | Lecture notes in computer science ; 4189Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006Description: Online-Ressource (XI, 548 p. Also available online, digital)ISBN:
  • 9783540446057
Subject(s): Genre/Form: Additional physical formats: 9783540446019 | Buchausg. u.d.T.: Computer security - ESORICS 2006. Berlin : Springer, 2006. XI, 548 S.DDC classification:
  • 005.82
  • 004.0151 23
LOC classification:
  • QA76.9.A25
DOI: DOI: 10.1007/11863908Online resources: Summary: Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.PPN: PPN: 1646705122Package identifier: Produktsigel: ZDB-2-SCS | ZDB-2-LNC | ZDB-2-SEB | ZDB-2-SCS | ZDB-2-SXCS | ZDB-2-SEB
No physical items for this record