Computer Security – ESORICS 2006 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings
Other Authors: | , , , |
---|---|
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2006, 2006
|
Edition: | 1st ed. 2006 |
Series: | Security and Cryptology
|
Subjects: | |
Online Access: | |
Collection: | Springer eBooks 2005- - Collection details see MPG.ReNa |
Table of Contents:
- Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards
- Private Information Retrieval Using Trusted Hardware
- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components
- License Transfer in OMA-DRM
- Enhanced Security Architecture for Music Distribution on Mobile
- A Formal Model of Access Control for Mobile Interactive Devices
- Discretionary Capability Confinement
- Minimal Threshold Closure
- Reducing the Dependence of SPKI/SDSI on PKI
- Delegation in Role-Based Access Control
- Applying a Security Requirements Engineering Process
- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
- A Formal Framework for Confidentiality-Preserving Refinement
- Timing-Sensitive Information Flow Analysis for Synchronous Systems
- HBAC: A Model for History-Based Access Control and Its Model Checking
- From Coupling Relations to Mated Invariants for Checking Information Flow
- A Linear Logic of Authorization and Knowledge
- Prêt à Voter with Re-encryption Mixes
- Secure Key-Updating for Lazy Revocation
- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
- Deriving Secrecy in Key Establishment Protocols
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes
- Conditional Reactive Simulatability
- SessionSafe: Implementing XSS Immune Session Handling
- Policy-Driven Memory Protection for Reconfigurable Hardware
- Privacy-Preserving Queries on Encrypted Data
- Analysis of Policy Anomalies on Distributed Network Security Setups
- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks
- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems