Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings

Bibliographic Details
Other Authors: Asarin, Eugene (Editor), Gollmann, Dieter (Editor), Meier, Jan (Editor), Sabelfeld, Andrei (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2006, 2006
Edition:1st ed. 2006
Series:Security and Cryptology
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
  • Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
  • TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
  • Private Information Retrieval Using Trusted Hardware
  • Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components
  • License Transfer in OMA-DRM
  • Enhanced Security Architecture for Music Distribution on Mobile
  • A Formal Model of Access Control for Mobile Interactive Devices
  • Discretionary Capability Confinement
  • Minimal Threshold Closure
  • Reducing the Dependence of SPKI/SDSI on PKI
  • Delegation in Role-Based Access Control
  • Applying a Security Requirements Engineering Process
  • Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
  • A Formal Framework for Confidentiality-Preserving Refinement
  • Timing-Sensitive Information Flow Analysis for Synchronous Systems
  • HBAC: A Model for History-Based Access Control and Its Model Checking
  • From Coupling Relations to Mated Invariants for Checking Information Flow
  • A Linear Logic of Authorization and Knowledge
  • Prêt à Voter with Re-encryption Mixes
  • Secure Key-Updating for Lazy Revocation
  • Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
  • Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
  • Deriving Secrecy in Key Establishment Protocols
  • Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes
  • Conditional Reactive Simulatability
  • SessionSafe: Implementing XSS Immune Session Handling
  • Policy-Driven Memory Protection for Reconfigurable Hardware
  • Privacy-Preserving Queries on Encrypted Data
  • Analysis of Policy Anomalies on Distributed Network Security Setups
  • Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks
  • Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems