05335nam 22008535 450 99646539230331620200630013940.03-540-30108-910.1007/b100085(CKB)1000000000212522(SSID)ssj0000127884(PQKBManifestationID)11141918(PQKBTitleCode)TC0000127884(PQKBWorkID)10054594(PQKB)10429998(DE-He213)978-3-540-30108-0(MiAaPQ)EBC3087774(PPN)155184784(EXLCZ)99100000000021252220121227d2004 u| 0engurnn|008mamaatxtccrComputer Security - ESORICS 2004[electronic resource] 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings /edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva1st ed. 2004.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2004.1 online resource (X, 457 p.) Lecture Notes in Computer Science,0302-9743 ;3193Bibliographic Level Mode of Issuance: Monograph3-540-22987-6 Includes bibliographical references at the end of each chapters and index.Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts.Lecture Notes in Computer Science,0302-9743 ;3193Data encryption (Computer science)Computer communication systemsOperating systems (Computers)Database managementComputers and civilizationManagement information systemsComputer scienceCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Database Managementhttps://scigraph.springernature.com/ontologies/product-market-codes/I18024Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Data encryption (Computer science).Computer communication systems.Operating systems (Computers).Database management.Computers and civilization.Management information systems.Computer science.Cryptology.Computer Communication Networks.Operating Systems.Database Management.Computers and Society.Management of Computing and Information Systems.005.8Samarati Pierangelaedthttp://id.loc.gov/vocabulary/relators/edtRyan Peteredthttp://id.loc.gov/vocabulary/relators/edtGollmann Dieteredthttp://id.loc.gov/vocabulary/relators/edtMolva Refikedthttp://id.loc.gov/vocabulary/relators/edtEuropean Symposium on Research in Computer SecurityMiAaPQMiAaPQMiAaPQBOOK996465392303316Computer Security - ESORICS 20042179796UNISA