|
|
|
|
LEADER |
03552nmm a2200433 u 4500 |
001 |
EB000376932 |
003 |
EBX01000000000000000229984 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783540446057
|
100 |
1 |
|
|a Asarin, Eugene
|e [editor]
|
245 |
0 |
0 |
|a Computer Security – ESORICS 2006
|h Elektronische Ressource
|b 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings
|c edited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld
|
250 |
|
|
|a 1st ed. 2006
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2006, 2006
|
300 |
|
|
|a XII, 550 p
|b online resource
|
505 |
0 |
|
|a Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Operating Systems
|
653 |
|
|
|a Computer science
|
653 |
|
|
|a Operating systems (Computers)
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Database Management
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Theory of Computation
|
653 |
|
|
|a Database management
|
653 |
|
|
|a IT Operations
|
700 |
1 |
|
|a Gollmann, Dieter
|e [editor]
|
700 |
1 |
|
|a Meier, Jan
|e [editor]
|
700 |
1 |
|
|a Sabelfeld, Andrei
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/11863908
|
856 |
4 |
0 |
|u https://doi.org/10.1007/11863908?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 004.0151
|