Custom cover image
Custom cover image

Advances in Computer Science - ASIAN 2007. Computer and Network Security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings / edited by Iliano Cervesato

Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Series: SpringerLink Bücher | Lecture notes in computer science ; 4846Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007Description: Online-Ressource (digital)ISBN:
  • 9783540769293
Subject(s): Genre/Form: Additional physical formats: 9783540769279 | Buchausg. u.d.T.: Advances in computer science - ASIAN 2007. Berlin : Springer, 2007. XI, 311 S.MSC: MSC: *68-06 | 00B25RVK: RVK: SS 4800LOC classification:
  • QA76.9.L63 QA76.5913 QA76.63
DOI: DOI: 10.1007/978-3-540-76929-3Online resources: Summary: Invited Speaker: Andrei Sabelfeld -- Dimensions of Declassification in Theory and Practice -- A Static Birthmark of Binary Executables Based on API Call Structure -- Compiling C Programs into a Strongly Typed Assembly Language -- Information Flow Testing -- Large Scale Simulation of Tor: -- Privacy Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols -- Scalable DRM System for Media Portability -- Computational Semantics for Basic Protocol Logic – A Stochastic Approach -- Management Advantages of Object Classification in Role-Based Access Control (RBAC) -- An Integrated Model for Access Control and Information Flow Requirements -- Digital Rights Management Using a Master Control Device -- Invited Speaker: Joshua Guttman -- How to do Things with Cryptographic Protocols -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming -- Secure Verification of Location Claims with Simultaneous Distance Modification -- Invited Speaker: Kazuhiko Kato -- Modeling and Virtualization for Secure Computing Environments -- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces -- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver Address in IPv6 for Protecting Unlinkability -- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts -- Combining Heterogeneous Classifiers for Network Intrusion Detection -- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments -- On Run-Time Enforcement of Policies -- Static vs Dynamic Typing for Access Control in Pi-Calculus -- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.PPN: PPN: 1646758994Package identifier: Produktsigel: ZDB-2-SCS | ZDB-2-LNC | ZDB-2-SEB | ZDB-2-SCS | ZDB-2-SXCS | ZDB-2-SEB
No physical items for this record