000 05199nam a22006375i 4500
001 978-3-540-74835-9
003 DE-He213
005 20240730184818.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540748359
_9978-3-540-74835-9
024 7 _a10.1007/978-3-540-74835-9
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aComputer Security - ESORICS 2007
_h[electronic resource] :
_b12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings /
_cedited by Joachim Biskup.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aXIV, 628 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4734
505 0 _aInvited Lecture -- Trustworthy Services and the Biological Analogy -- Security Architecture and Secure Components I -- Security of Multithreaded Programs by Compilation -- Efficient Proving for Practical Distributed Access-Control Systems -- Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control -- Access Control I -- Pragmatic XML Access Control Using Off-the-Shelf RDBMS -- Conditional Privacy-Aware Role Based Access Control -- Satisfiability and Resiliency in Workflow Systems -- Applied Cryptography I -- Completeness of the Authentication Tests -- SilentKnock: Practical, Provably Undetectable Authentication -- Generalized Key Delegation for Hierarchical Identity-Based Encryption -- Change-Impact Analysis of Firewall Policies -- Fragmentation and Encryption to Enforce Privacy in Data Storage -- Information Confinement, Privacy, and Security in RFID Systems -- Formal Methods in Security I -- A Logic for State-Modifying Authorization Policies -- Inductive Proofs of Computational Secrecy -- What, Indeed, Is Intransitive Noninterference? -- Traceability and Integrity of Execution in Distributed Workflow Management Systems -- Dynamic Information Flow Control Architecture for Web Applications -- Cloak: A Ten-Fold Way for Reliable Covert Communications -- Applied Cryptography II -- Efficient Password-Based Authenticated Key Exchange Without Public Information -- Improved Anonymous Timed-Release Encryption -- Encryption Techniques for Secure Database Outsourcing -- Access Control II -- Click Passwords Under Investigation -- Graphical Password Authentication Using Cued Click Points -- Obligations and Their Interaction with Programs -- Applied Cryptography III -- On the Privacy of Concealed Data Aggregation -- Synthesizing Secure Protocols -- A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols -- Security Architecture and Secure Components II -- Security Evaluation of Scenarios Based on the TCG's TPM Specification -- Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods -- Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links -- Towards Modeling Trust Based Decisions: A Game Theoretic Approach -- Extending the Common Services of eduGAIN with a Credential Conversion Service -- Incorporating Temporal Capabilities in Existing Key Management Schemes -- A Policy Language for Distributed Usage Control -- Countering Statistical Disclosure with Receiver-Bound Cover Traffic -- Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack -- Formal Methods in Security III -- Modular Access Control Via Strategic Rewriting -- On the Automated Correction of Security Protocols Susceptible to a Replay Attack -- Adaptive Soundness of Static Equivalence.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aOperating systems (Computers).
_95329
650 0 _aComputer networks .
_931572
650 0 _aDatabase management.
_93157
650 0 _aElectronic data processing
_xManagement.
_9136825
650 0 _aComputers and civilization.
_921733
650 1 4 _aCryptology.
_931769
650 2 4 _aOperating Systems.
_937074
650 2 4 _aComputer Communication Networks.
_9136826
650 2 4 _aDatabase Management.
_93157
650 2 4 _aIT Operations.
_931703
650 2 4 _aComputers and Society.
_931668
700 1 _aBiskup, Joachim.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9136827
710 2 _aSpringerLink (Online service)
_9136828
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540748342
776 0 8 _iPrinted edition:
_z9783540843665
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4734
_9136829
856 4 0 _uhttps://doi.org/10.1007/978-3-540-74835-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c92499
_d92499