|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNISA996465392303316 |
|
|
Titolo |
Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2004.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (X, 457 p.) |
|
|
|
|
|
|
Collana |
|
Lecture Notes in Computer Science, , 0302-9743 ; ; 3193 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data encryption (Computer science) |
Computer communication systems |
Operating systems (Computers) |
Database management |
Computers and civilization |
Management information systems |
Computer science |
Cryptology |
Computer Communication Networks |
Operating Systems |
Database Management |
Computers and Society |
Management of Computing and Information Systems |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references at the end of each chapters and index. |
|
|
|
|
|
|
|
|
Nota di contenuto |
|
Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization |
|
|
|
|
|
|
|
|
|
|
of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts. |
|
|
|
|
|
| |