
×
Computer Security – ESORICS 2006
11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings
herausgegeben von Eugene Asarin, Dieter Gollmann, Jan Meier und Andrei SabelfeldInhaltsverzeichnis
- Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.
- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.
- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
- Private Information Retrieval Using Trusted Hardware.
- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
- License Transfer in OMA-DRM.
- Enhanced Security Architecture for Music Distribution on Mobile.
- A Formal Model of Access Control for Mobile Interactive Devices.
- Discretionary Capability Confinement.
- Minimal Threshold Closure.
- Reducing the Dependence of SPKI/SDSI on PKI.
- Delegation in Role-Based Access Control.
- Applying a Security Requirements Engineering Process.
- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.
- A Formal Framework for Confidentiality-Preserving Refinement.
- Timing-Sensitive Information Flow Analysis for Synchronous Systems.
- HBAC: A Model for History-Based Access Control and Its Model Checking.
- From Coupling Relations to Mated Invariants for Checking Information Flow.
- A Linear Logic of Authorization and Knowledge.
- Prêt à Voter with Re-encryption Mixes.
- Secure Key-Updating for Lazy Revocation.
- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems.
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.
- Deriving Secrecy in Key Establishment Protocols.
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
- Conditional Reactive Simulatability.
- SessionSafe: Implementing XSS Immune Session Handling.
- Policy-Driven Memory Protection for Reconfigurable Hardware.
- Privacy-Preserving Queries on Encrypted Data.
- Analysis of Policy Anomalies on Distributed Network Security Setups.
- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.
- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.