FEEDBACK Smiley face
Normal view MARC view ISBD view

Computer Security – ESORICS 2006 [electronic resource] :11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006. Proceedings /

Contributor(s): Gollmann, Dieter [editor.] | Meier, Jan [editor.] | Sabelfeld, Andrei [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Lecture Notes in Computer Science: 4189Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2006.Description: XII, 550 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540446057.Subject(s): Computer science | Computer communication systems | Operating systems (Computers) | Data encryption (Computer science) | Computers | Database management | Management information systems | Computer Science | Theory of Computation | Data Encryption | Operating Systems | Computer Communication Networks | Database Management | Management of Computing and Information SystemsOnline resources: Click here to access online
Contents:
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
In: Springer eBooks
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
No physical items for this record

Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.

There are no comments for this item.

Log in to your account to post a comment.

© IIIT-Delhi, 2013 | Phone: +91-11-26907510| FAX +91-11-26907405 | E-mail: library@iiitd.ac.in