Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings

Bibliographic Details
Other Authors: Asarin, Eugene (Editor), Gollmann, Dieter (Editor), Meier, Jan (Editor), Sabelfeld, Andrei (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2006, 2006
Edition:1st ed. 2006
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03552nmm a2200433 u 4500
001 EB000376932
003 EBX01000000000000000229984
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783540446057 
100 1 |a Asarin, Eugene  |e [editor] 
245 0 0 |a Computer Security – ESORICS 2006  |h Elektronische Ressource  |b 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings  |c edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld 
250 |a 1st ed. 2006 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2006, 2006 
300 |a XII, 550 p  |b online resource 
505 0 |a Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems 
653 |a Computer Communication Networks 
653 |a Operating Systems 
653 |a Computer science 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Database Management 
653 |a Computer networks  
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a Theory of Computation 
653 |a Database management 
653 |a IT Operations 
700 1 |a Gollmann, Dieter  |e [editor] 
700 1 |a Meier, Jan  |e [editor] 
700 1 |a Sabelfeld, Andrei  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Security and Cryptology 
028 5 0 |a 10.1007/11863908 
856 4 0 |u https://doi.org/10.1007/11863908?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.0151