Computer Security – ESORICS 2007 (Record no. 37099)

000 -LEADER
fixed length control field 04929nam a22005655i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783540748359
-- 978-3-540-74835-9
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
245 10 - TITLE STATEMENT
Title Computer Security – ESORICS 2007
Sub Title 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings /
Statement of responsibility, etc edited by Joachim Biskup, Javier López.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 2007.
300 ## - PHYSICAL DESCRIPTION
Number of Pages XIV, 628 p.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Invited Lecture -- Trustworthy Services and the Biological Analogy -- Security Architecture and Secure Components I -- Security of Multithreaded Programs by Compilation -- Efficient Proving for Practical Distributed Access-Control Systems -- Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control -- Access Control I -- Pragmatic XML Access Control Using Off-the-Shelf RDBMS -- Conditional Privacy-Aware Role Based Access Control -- Satisfiability and Resiliency in Workflow Systems -- Applied Cryptography I -- Completeness of the Authentication Tests -- SilentKnock: Practical, Provably Undetectable Authentication -- Generalized Key Delegation for Hierarchical Identity-Based Encryption -- Change-Impact Analysis of Firewall Policies -- Fragmentation and Encryption to Enforce Privacy in Data Storage -- Information Confinement, Privacy, and Security in RFID Systems -- Formal Methods in Security I -- A Logic for State-Modifying Authorization Policies -- Inductive Proofs of Computational Secrecy -- What, Indeed, Is Intransitive Noninterference? -- Traceability and Integrity of Execution in Distributed Workflow Management Systems -- Dynamic Information Flow Control Architecture for Web Applications -- Cloak: A Ten-Fold Way for Reliable Covert Communications -- Applied Cryptography II -- Efficient Password-Based Authenticated Key Exchange Without Public Information -- Improved Anonymous Timed-Release Encryption -- Encryption Techniques for Secure Database Outsourcing -- Access Control II -- Click Passwords Under Investigation -- Graphical Password Authentication Using Cued Click Points -- Obligations and Their Interaction with Programs -- Applied Cryptography III -- On the Privacy of Concealed Data Aggregation -- Synthesizing Secure Protocols -- A Cryptographic Model for Branching Time Security Properties – The Case of Contract Signing Protocols -- Security Architecture and Secure Components II -- Security Evaluation of Scenarios Based on the TCG’s TPM Specification -- Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods -- Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links -- Towards Modeling Trust Based Decisions: A Game Theoretic Approach -- Extending the Common Services of eduGAIN with a Credential Conversion Service -- Incorporating Temporal Capabilities in Existing Key Management Schemes -- A Policy Language for Distributed Usage Control -- Countering Statistical Disclosure with Receiver-Bound Cover Traffic -- Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack -- Formal Methods in Security III -- Modular Access Control Via Strategic Rewriting -- On the Automated Correction of Security Protocols Susceptible to a Replay Attack -- Adaptive Soundness of Static Equivalence.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Database management.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Information Systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Database Management.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Management of Computing and Information Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computers and Society.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Biskup, Joachim.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name López, Javier.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/978-3-540-74835-9
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2007.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK7805 http://dx.doi.org/10.1007/978-3-540-74835-9 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha