Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings /
        Saved in:
      
    
                  | 企业作者: | |
|---|---|
| 其他作者: | |
| 格式: | 电子 电子书 | 
| 语言: | English | 
| 出版: | Berlin, Heidelberg :
        Springer Berlin Heidelberg : Imprint: Springer,
    
      2007. | 
| 版: | 1st ed. 2007. | 
| 丛编: | Security and Cryptology ;
              4734 | 
| 主题: | |
| 在线阅读: | https://doi.org/10.1007/978-3-540-74835-9 | 
| 标签: | 添加标签 
      没有标签, 成为第一个标记此记录!
   | 
                书本目录: 
            
                  - Invited Lecture
- Trustworthy Services and the Biological Analogy
- Security Architecture and Secure Components I
- Security of Multithreaded Programs by Compilation
- Efficient Proving for Practical Distributed Access-Control Systems
- Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
- Access Control I
- Pragmatic XML Access Control Using Off-the-Shelf RDBMS
- Conditional Privacy-Aware Role Based Access Control
- Satisfiability and Resiliency in Workflow Systems
- Applied Cryptography I
- Completeness of the Authentication Tests
- SilentKnock: Practical, Provably Undetectable Authentication
- Generalized Key Delegation for Hierarchical Identity-Based Encryption
- Change-Impact Analysis of Firewall Policies
- Fragmentation and Encryption to Enforce Privacy in Data Storage
- Information Confinement, Privacy, and Security in RFID Systems
- Formal Methods in Security I
- A Logic for State-Modifying Authorization Policies
- Inductive Proofs of Computational Secrecy
- What, Indeed, Is Intransitive Noninterference?
- Traceability and Integrity of Execution in Distributed Workflow Management Systems
- Dynamic Information Flow Control Architecture for Web Applications
- Cloak: A Ten-Fold Way for Reliable Covert Communications
- Applied Cryptography II
- Efficient Password-Based Authenticated Key Exchange Without Public Information
- Improved Anonymous Timed-Release Encryption
- Encryption Techniques for Secure Database Outsourcing
- Access Control II
- Click Passwords Under Investigation
- Graphical Password Authentication Using Cued Click Points
- Obligations and Their Interaction with Programs
- Applied Cryptography III
- On the Privacy of Concealed Data Aggregation
- Synthesizing Secure Protocols
- A Cryptographic Model for Branching Time Security Properties – The Case of Contract Signing Protocols
- Security Architecture and Secure Components II
- Security Evaluation of Scenarios Based on the TCG’s TPM Specification
- Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods
- Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links
- Towards Modeling Trust Based Decisions: A Game Theoretic Approach
- Extending the Common Services of eduGAIN with a Credential Conversion Service
- Incorporating Temporal Capabilities in Existing Key Management Schemes
- A Policy Language for Distributed Usage Control
- Countering Statistical Disclosure with Receiver-Bound Cover Traffic
- Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
- Formal Methods in Security III
- Modular Access Control Via Strategic Rewriting
- On the Automated Correction of Security Protocols Susceptible to a Replay Attack
- Adaptive Soundness of Static Equivalence.



