Computer Security – ESORICS 2006 | 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings | ISBN 9783540446057

Computer Security – ESORICS 2006

11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings

herausgegeben von Eugene Asarin, Dieter Gollmann, Jan Meier und Andrei Sabelfeld
Mitwirkende
Herausgegeben vonEugene Asarin
Herausgegeben vonDieter Gollmann
Herausgegeben vonJan Meier
Herausgegeben vonAndrei Sabelfeld
Buchcover Computer Security – ESORICS 2006  | EAN 9783540446057 | ISBN 3-540-44605-2 | ISBN 978-3-540-44605-7

Computer Security – ESORICS 2006

11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings

herausgegeben von Eugene Asarin, Dieter Gollmann, Jan Meier und Andrei Sabelfeld
Mitwirkende
Herausgegeben vonEugene Asarin
Herausgegeben vonDieter Gollmann
Herausgegeben vonJan Meier
Herausgegeben vonAndrei Sabelfeld

Inhaltsverzeichnis

  • Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.
  • Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.
  • TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
  • Private Information Retrieval Using Trusted Hardware.
  • Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
  • License Transfer in OMA-DRM.
  • Enhanced Security Architecture for Music Distribution on Mobile.
  • A Formal Model of Access Control for Mobile Interactive Devices.
  • Discretionary Capability Confinement.
  • Minimal Threshold Closure.
  • Reducing the Dependence of SPKI/SDSI on PKI.
  • Delegation in Role-Based Access Control.
  • Applying a Security Requirements Engineering Process.
  • Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.
  • A Formal Framework for Confidentiality-Preserving Refinement.
  • Timing-Sensitive Information Flow Analysis for Synchronous Systems.
  • HBAC: A Model for History-Based Access Control and Its Model Checking.
  • From Coupling Relations to Mated Invariants for Checking Information Flow.
  • A Linear Logic of Authorization and Knowledge.
  • Prêt à Voter with Re-encryption Mixes.
  • Secure Key-Updating for Lazy Revocation.
  • Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems.
  • Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.
  • Deriving Secrecy in Key Establishment Protocols.
  • Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
  • Conditional Reactive Simulatability.
  • SessionSafe: Implementing XSS Immune Session Handling.
  • Policy-Driven Memory Protection for Reconfigurable Hardware.
  • Privacy-Preserving Queries on Encrypted Data.
  • Analysis of Policy Anomalies on Distributed Network Security Setups.
  • Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.
  • Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.