LEADER 01055cam2 22002771 450 001 SOBE00057605 005 20211223101127.0 100 $a20171130d1975 |||||ita|0103 ba 101 $aita 102 $aIT 200 0 $a6: 1974-1975$fCentro studi e documentazione sull'Italia romana 210 $aMilano$cVarese$cIstituto Editoriale Cisalpino$d[stampa 1975] 215 $a266 p.$cill.$d24 cm 225 2 $aBiblioteca storica universitaria 410 1$1001LAEC00022898$12001 $a*Biblioteca storica universitaria 461 1$1001SOBE00057593$12001 $aAtti del Centro studi e documentazione sull'Italia romana 710 02$a*Centro *studi e *documentazione sull'*Italia romana$3SOBA00015648$4070$0205235 801 0$aIT$bUNISOB$c20211223$gRICA 850 $aUNISOB 852 $aUNISOB$j900$m22932 912 $aSOBE00057605 940 $aM 102 Monografia moderna SBN 941 $aW 957 $a900$bL (50)$i-6$gSI$d22932$racquisto$1bethb$2UNISOB$3UNISOB$420171130135030.0$520211223101127.0$6rovito 996 $a6: 1974-1975$91728746 997 $aUNISOB LEADER 06044nam 22008415 450 001 9910484150903321 005 20251226202539.0 024 7 $a10.1007/11555827 035 $a(CKB)1000000000213253 035 $a(SSID)ssj0000316901 035 $a(PQKBManifestationID)11258554 035 $a(PQKBTitleCode)TC0000316901 035 $a(PQKBWorkID)10276725 035 $a(PQKB)10005376 035 $a(DE-He213)978-3-540-31981-8 035 $a(MiAaPQ)EBC3067901 035 $a(PPN)123097541 035 $a(EXLCZ)991000000000213253 100 $a20100315d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 2005 $e10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings /$fedited by Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 516 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v3679 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-31981-6 311 08$a3-540-28963-1 320 $aIncludes bibliographical references and index. 327 $aComputerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation inthe Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols. 330 $aForeword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12?14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The conference program also includes an invited talk by Barbara Simons. There is a long list of people who volunteered their time and energy to put together the symposiom and who deserve acknowledgment. Thanks to all the members of the program committee, and the external reviewers, for all their hard workin evaluating and discussing papers. We are also very grateful to all those people whose work ensured a smooth organizational process: Pierangela Samarati, who served as General Chair, Claudio Ardagna, who served as P- licity Chair, Dieter Gollmann who served as Publication Chair and collated this volume, and Emilia Rosti and Olga Scotti for helping with local arrangements. Last, but certainly not least, our thanks go to all the authors who submitted papers and all the attendees. We hope you ?nd the program stimulating. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v3679 606 $aCryptography 606 $aData encryption (Computer science) 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aDatabase management 606 $aElectronic data processing$xManagement 606 $aComputers and civilization 606 $aCryptology 606 $aComputer Communication Networks 606 $aOperating Systems 606 $aDatabase Management 606 $aIT Operations 606 $aComputers and Society 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 0$aDatabase management. 615 0$aElectronic data processing$xManagement. 615 0$aComputers and civilization. 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aDatabase Management. 615 24$aIT Operations. 615 24$aComputers and Society. 676 $a005.8 701 $aDe Capitani di Vimercati$b Sabrina$0724909 701 $aSyverson$b Paul F$01760069 701 $aGollmann$b Dieter$0634137 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484150903321 996 $aComputer security--ESORICS 2005$94198849 997 $aUNINA