000 04602nam a22006495i 4500
001 978-3-540-44605-7
003 DE-He213
005 20240730190549.0
007 cr nn 008mamaa
008 100301s2006 gw | s |||| 0|eng d
020 _a9783540446057
_9978-3-540-44605-7
024 7 _a10.1007/11863908
_2doi
050 4 _aQA75.5-76.95
072 7 _aUYA
_2bicssc
072 7 _aCOM014000
_2bisacsh
072 7 _aUYA
_2thema
082 0 4 _a004.0151
_223
245 1 0 _aComputer Security - ESORICS 2006
_h[electronic resource] :
_b11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings /
_cedited by Eugene Asarin, Dieter Gollmann, Jan Meier, Andrei Sabelfeld.
250 _a1st ed. 2006.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2006.
300 _aXII, 550 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v4189
505 0 _aFinding Peer-to-Peer File-Sharing Using Coarse Network Behaviors -- Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses -- TrustedPals: Secure Multiparty Computation Implemented with Smart Cards -- Private Information Retrieval Using Trusted Hardware -- Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components -- License Transfer in OMA-DRM -- Enhanced Security Architecture for Music Distribution on Mobile -- A Formal Model of Access Control for Mobile Interactive Devices -- Discretionary Capability Confinement -- Minimal Threshold Closure -- Reducing the Dependence of SPKI/SDSI on PKI -- Delegation in Role-Based Access Control -- Applying a Security Requirements Engineering Process -- Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System -- A Formal Framework for Confidentiality-Preserving Refinement -- Timing-Sensitive Information Flow Analysis for Synchronous Systems -- HBAC: A Model for History-Based Access Control and Its Model Checking -- From Coupling Relations to Mated Invariants for Checking Information Flow -- A Linear Logic of Authorization and Knowledge -- Prêt à Voter with Re-encryption Mixes -- Secure Key-Updating for Lazy Revocation -- Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems -- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos -- Deriving Secrecy in Key Establishment Protocols -- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes -- Conditional Reactive Simulatability -- SessionSafe: Implementing XSS Immune Session Handling -- Policy-Driven Memory Protection for Reconfigurable Hardware -- Privacy-Preserving Queries on Encrypted Data -- Analysis of Policy Anomalies on Distributed Network Security Setups -- Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks -- Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
650 0 _aComputer science.
_99832
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aOperating systems (Computers).
_95329
650 0 _aComputer networks .
_931572
650 0 _aDatabase management.
_93157
650 0 _aElectronic data processing
_xManagement.
_9142981
650 1 4 _aTheory of Computation.
_9142982
650 2 4 _aCryptology.
_931769
650 2 4 _aOperating Systems.
_937074
650 2 4 _aComputer Communication Networks.
_9142983
650 2 4 _aDatabase Management.
_93157
650 2 4 _aIT Operations.
_931703
700 1 _aAsarin, Eugene.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9142984
700 1 _aGollmann, Dieter.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9142985
700 1 _aMeier, Jan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9142986
700 1 _aSabelfeld, Andrei.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9142987
710 2 _aSpringerLink (Online service)
_9142988
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540446019
776 0 8 _iPrinted edition:
_z9783540830443
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v4189
_9142989
856 4 0 _uhttps://doi.org/10.1007/11863908
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c93321
_d93321