Computer Security – ESORICS 2007 [electronic resource] : 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings / edited by Joachim Biskup, Javier López.

Contributor(s): Biskup, Joachim [editor.] | López, Javier [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 4734Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007Description: XIV, 628 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540748359Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Database management | Information Systems | Computer Science | Data Encryption | Operating Systems | Computer Communication Networks | Database Management | Management of Computing and Information Systems | Computers and SocietyAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Invited Lecture -- Trustworthy Services and the Biological Analogy -- Security Architecture and Secure Components I -- Security of Multithreaded Programs by Compilation -- Efficient Proving for Practical Distributed Access-Control Systems -- Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control -- Access Control I -- Pragmatic XML Access Control Using Off-the-Shelf RDBMS -- Conditional Privacy-Aware Role Based Access Control -- Satisfiability and Resiliency in Workflow Systems -- Applied Cryptography I -- Completeness of the Authentication Tests -- SilentKnock: Practical, Provably Undetectable Authentication -- Generalized Key Delegation for Hierarchical Identity-Based Encryption -- Change-Impact Analysis of Firewall Policies -- Fragmentation and Encryption to Enforce Privacy in Data Storage -- Information Confinement, Privacy, and Security in RFID Systems -- Formal Methods in Security I -- A Logic for State-Modifying Authorization Policies -- Inductive Proofs of Computational Secrecy -- What, Indeed, Is Intransitive Noninterference? -- Traceability and Integrity of Execution in Distributed Workflow Management Systems -- Dynamic Information Flow Control Architecture for Web Applications -- Cloak: A Ten-Fold Way for Reliable Covert Communications -- Applied Cryptography II -- Efficient Password-Based Authenticated Key Exchange Without Public Information -- Improved Anonymous Timed-Release Encryption -- Encryption Techniques for Secure Database Outsourcing -- Access Control II -- Click Passwords Under Investigation -- Graphical Password Authentication Using Cued Click Points -- Obligations and Their Interaction with Programs -- Applied Cryptography III -- On the Privacy of Concealed Data Aggregation -- Synthesizing Secure Protocols -- A Cryptographic Model for Branching Time Security Properties – The Case of Contract Signing Protocols -- Security Architecture and Secure Components II -- Security Evaluation of Scenarios Based on the TCG’s TPM Specification -- Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods -- Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links -- Towards Modeling Trust Based Decisions: A Game Theoretic Approach -- Extending the Common Services of eduGAIN with a Credential Conversion Service -- Incorporating Temporal Capabilities in Existing Key Management Schemes -- A Policy Language for Distributed Usage Control -- Countering Statistical Disclosure with Receiver-Bound Cover Traffic -- Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack -- Formal Methods in Security III -- Modular Access Control Via Strategic Rewriting -- On the Automated Correction of Security Protocols Susceptible to a Replay Attack -- Adaptive Soundness of Static Equivalence.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK7805

Invited Lecture -- Trustworthy Services and the Biological Analogy -- Security Architecture and Secure Components I -- Security of Multithreaded Programs by Compilation -- Efficient Proving for Practical Distributed Access-Control Systems -- Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control -- Access Control I -- Pragmatic XML Access Control Using Off-the-Shelf RDBMS -- Conditional Privacy-Aware Role Based Access Control -- Satisfiability and Resiliency in Workflow Systems -- Applied Cryptography I -- Completeness of the Authentication Tests -- SilentKnock: Practical, Provably Undetectable Authentication -- Generalized Key Delegation for Hierarchical Identity-Based Encryption -- Change-Impact Analysis of Firewall Policies -- Fragmentation and Encryption to Enforce Privacy in Data Storage -- Information Confinement, Privacy, and Security in RFID Systems -- Formal Methods in Security I -- A Logic for State-Modifying Authorization Policies -- Inductive Proofs of Computational Secrecy -- What, Indeed, Is Intransitive Noninterference? -- Traceability and Integrity of Execution in Distributed Workflow Management Systems -- Dynamic Information Flow Control Architecture for Web Applications -- Cloak: A Ten-Fold Way for Reliable Covert Communications -- Applied Cryptography II -- Efficient Password-Based Authenticated Key Exchange Without Public Information -- Improved Anonymous Timed-Release Encryption -- Encryption Techniques for Secure Database Outsourcing -- Access Control II -- Click Passwords Under Investigation -- Graphical Password Authentication Using Cued Click Points -- Obligations and Their Interaction with Programs -- Applied Cryptography III -- On the Privacy of Concealed Data Aggregation -- Synthesizing Secure Protocols -- A Cryptographic Model for Branching Time Security Properties – The Case of Contract Signing Protocols -- Security Architecture and Secure Components II -- Security Evaluation of Scenarios Based on the TCG’s TPM Specification -- Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods -- Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links -- Towards Modeling Trust Based Decisions: A Game Theoretic Approach -- Extending the Common Services of eduGAIN with a Credential Conversion Service -- Incorporating Temporal Capabilities in Existing Key Management Schemes -- A Policy Language for Distributed Usage Control -- Countering Statistical Disclosure with Receiver-Bound Cover Traffic -- Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack -- Formal Methods in Security III -- Modular Access Control Via Strategic Rewriting -- On the Automated Correction of Security Protocols Susceptible to a Replay Attack -- Adaptive Soundness of Static Equivalence.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha