Vai al contenuto principale della pagina
Titolo: | Computer Security - ESORICS 2004 : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva |
Pubblicazione: | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Edizione: | 1st ed. 2004. |
Descrizione fisica: | 1 online resource (X, 457 p.) |
Disciplina: | 005.8 |
Soggetto topico: | Data encryption (Computer science) |
Computer networks | |
Operating systems (Computers) | |
Database management | |
Computers and civilization | |
Management information systems | |
Computer science | |
Cryptology | |
Computer Communication Networks | |
Operating Systems | |
Database Management | |
Computers and Society | |
Management of Computing and Information Systems | |
Persona (resp. second.): | SamaratiPierangela |
RyanPeter | |
GollmannDieter | |
MolvaRefik | |
Note generali: | Bibliographic Level Mode of Issuance: Monograph |
Nota di bibliografia: | Includes bibliographical references at the end of each chapters and index. |
Nota di contenuto: | Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts. |
Titolo autorizzato: | Computer Security - ESORICS 2004 |
ISBN: | 3-540-30108-9 |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910768178503321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |