Computer Security - ESORICS 2004 [[electronic resource] ] : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (X, 457 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Database management Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Database Management Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-30108-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts. |
Record Nr. | UNISA-996465392303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Computer Security - ESORICS 2004 : 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings / / edited by Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (X, 457 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer networks Operating systems (Computers) Database management Computers and civilization Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Database Management Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-30108-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Incorporating Dynamic Constraints in the Flexible Authorization Framework -- Access-Condition-Table-Driven Access Control for XML Databases -- An Algebra for Composing Enterprise Privacy Policies -- Deriving, Attacking and Defending the GDOI Protocol -- Better Privacy for Trusted Computing Platforms -- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol -- A Formalization of Anonymity and Onion Routing -- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics -- Comparison Between Two Practical Mix Designs -- Signature Bouquets: Immutability for Aggregated/Condensed Signatures -- Towards a Theory of Data Entanglement -- Portable and Flexible Document Access Control Mechanisms -- Possibilistic Information Flow Control in the Presence of Encrypted Communication -- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage -- Security Property Based Administrative Controls -- A Vector Model of Trust for Developing Trustworthy Systems -- Parameterized Authentication -- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks -- Hindering Eavesdropping via IPv6 Opportunistic Encryption -- On the Role of Key Schedules in Attacks on Iterated Ciphers -- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts -- A Host Intrusion Prevention System for Windows Operating Systems -- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table -- ARCHERR: Runtime Environment Driven Program Safety -- Sets, Bags, and Rock and Roll -- Redundancy and Diversity in Security -- Discovering Novel Attack Strategies from INFOSEC Alerts. |
Record Nr. | UNINA-9910768178503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The EU through the eyes of Asia [[electronic resource]] . Volume II : new cases, new findings / / editors, Natalia Chaban, Martin Holland, Peter Ryan |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2009 |
Descrizione fisica | x, 271 p. : ill. (some col.) |
Disciplina | 341.242/2095 |
Altri autori (Persone) |
ChabanNatalia
HollandMartin RyanPeter |
Collana | The EU through the eyes of Asia |
Soggetto topico | Public opinion - Asia |
Soggetto genere / forma | Electronic books. |
ISBN |
1-282-76176-5
9786612761768 981-4289-89-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction : Asia's visions of the European Union : introducing the volume / Martin Holland, Natalia Chaban and Peter Ryan -- ch. 1. Orientalism reversed : images and perceptions of the EU in the Philippines / Alma Maria O. Salvador, Leslie V. Advincula-Lopez and Manuel Enverga -- ch. 2. Images and perceptions of the EU in Vietnam : media, elite and public opinion perspectives / Pham Quang Minh, Bui Hai Dang and Tran Bach Hieu -- ch. 3. EU images in Indonesia / CPF Luhulima, Edward ML Panjaitan and Anika Widiana -- ch. 4. Assuming superpower status? Evolving Asian perceptions of the EU as a political and economic actor / Martin Holland -- ch. 5. "Soft power' and a 'Human face' : images of the EU as a social, environmental and developmental actor in the Asian media and public discourses / Natalia Chaban -- ch. 6. ASEM under the radar : media portrayals of Asia-Europe meeting in Asia / Suet Yi Lai and Natalia Chaban -- ch. 7. Policy recommendations and ESiA / Peter Ryan. |
Record Nr. | UNINA-9910455604503321 |
Hackensack, N.J., : World Scientific, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The EU through the eyes of Asia [[electronic resource]] . Volume II : new cases, new findings / / editors, Natalia Chaban, Martin Holland, Peter Ryan |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2009 |
Descrizione fisica | x, 271 p. : ill. (some col.) |
Disciplina | 341.242/2095 |
Altri autori (Persone) |
ChabanNatalia
HollandMartin RyanPeter |
Collana | The EU through the eyes of Asia |
Soggetto topico | Public opinion - Asia |
ISBN |
1-282-76176-5
9786612761768 981-4289-89-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction : Asia's visions of the European Union : introducing the volume / Martin Holland, Natalia Chaban and Peter Ryan -- ch. 1. Orientalism reversed : images and perceptions of the EU in the Philippines / Alma Maria O. Salvador, Leslie V. Advincula-Lopez and Manuel Enverga -- ch. 2. Images and perceptions of the EU in Vietnam : media, elite and public opinion perspectives / Pham Quang Minh, Bui Hai Dang and Tran Bach Hieu -- ch. 3. EU images in Indonesia / CPF Luhulima, Edward ML Panjaitan and Anika Widiana -- ch. 4. Assuming superpower status? Evolving Asian perceptions of the EU as a political and economic actor / Martin Holland -- ch. 5. "Soft power' and a 'Human face' : images of the EU as a social, environmental and developmental actor in the Asian media and public discourses / Natalia Chaban -- ch. 6. ASEM under the radar : media portrayals of Asia-Europe meeting in Asia / Suet Yi Lai and Natalia Chaban -- ch. 7. Policy recommendations and ESiA / Peter Ryan. |
Record Nr. | UNINA-9910780729103321 |
Hackensack, N.J., : World Scientific, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
The EU through the eyes of Asia [[electronic resource]] . Volume II : new cases, new findings / / editors, Natalia Chaban, Martin Holland, Peter Ryan |
Pubbl/distr/stampa | Hackensack, N.J., : World Scientific, c2009 |
Descrizione fisica | x, 271 p. : ill. (some col.) |
Disciplina | 341.242/2095 |
Altri autori (Persone) |
ChabanNatalia
HollandMartin RyanPeter |
Collana | The EU through the eyes of Asia |
Soggetto topico | Public opinion - Asia |
ISBN |
1-282-76176-5
9786612761768 981-4289-89-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction : Asia's visions of the European Union : introducing the volume / Martin Holland, Natalia Chaban and Peter Ryan -- ch. 1. Orientalism reversed : images and perceptions of the EU in the Philippines / Alma Maria O. Salvador, Leslie V. Advincula-Lopez and Manuel Enverga -- ch. 2. Images and perceptions of the EU in Vietnam : media, elite and public opinion perspectives / Pham Quang Minh, Bui Hai Dang and Tran Bach Hieu -- ch. 3. EU images in Indonesia / CPF Luhulima, Edward ML Panjaitan and Anika Widiana -- ch. 4. Assuming superpower status? Evolving Asian perceptions of the EU as a political and economic actor / Martin Holland -- ch. 5. "Soft power' and a 'Human face' : images of the EU as a social, environmental and developmental actor in the Asian media and public discourses / Natalia Chaban -- ch. 6. ASEM under the radar : media portrayals of Asia-Europe meeting in Asia / Suet Yi Lai and Natalia Chaban -- ch. 7. Policy recommendations and ESiA / Peter Ryan. |
Record Nr. | UNINA-9910826614403321 |
Hackensack, N.J., : World Scientific, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Formal Aspects of Security [[electronic resource] ] : First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers / / edited by Ali E. Abdallah, Peter Ryan, Steve Schneider |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (X, 246 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Operating systems (Computers) Computers and civilization Management information systems Computer science Computer Communication Networks Cryptology Software Engineering Operating Systems Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-40981-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems. |
Record Nr. | UNISA-996465921003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Formal Aspects of Security : First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers / / edited by Ali E. Abdallah, Peter Ryan, Steve Schneider |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (X, 246 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Computer networks
Data encryption (Computer science) Software engineering Operating systems (Computers) Computers and civilization Management information systems Computer science Computer Communication Networks Cryptology Software Engineering Operating Systems Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-40981-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems. |
Record Nr. | UNINA-9910768436903321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Mechanisms of Plant-Aluminum Interactions in Acidic Soils |
Autore | Li Yang Jian |
Pubbl/distr/stampa | Frontiers Media SA, 2019 |
Descrizione fisica | 1 electronic resource (114 p.) |
Soggetto topico |
Science: general issues
Botany & plant sciences |
Soggetto non controllato |
acid soils
Plant-Aluminum Interactions Plant Growth Aluminum Al toxicity aluminum tolerance |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910557233703321 |
Li Yang Jian | ||
Frontiers Media SA, 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|