Hervé Debar, Marc Dacier, Mehdi Nassehi, Andreas Wespi (auth.), Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann (eds.)3540650040, 9783540650041
The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.
Table of contents :
Fixed vs. variable-length patterns for detecting suspicious process behavior….Pages 1-15
A tool for pro-active defense against the buffer overrun attack….Pages 17-31
A kernelized architecture for multilevel secure application policies….Pages 33-49
Dealing with multi-policy security in large open distributed systems….Pages 51-66
A flexible method for information system security policy specification….Pages 67-84
On the security of some variants of the RSA signature scheme….Pages 85-96
Side channel cryptanalysis of product ciphers….Pages 97-110
On the security of digital tachographs….Pages 111-125
An authorization model and its formal semantics….Pages 127-142
Authorization in CORBA security….Pages 143-158
Rules for designing multilevel Object-Oriented Databases….Pages 159-174
Byte code verification for Java smart cards based on model checking….Pages 175-190
Towards formalizing the Java security architecture of JDK 1.2….Pages 191-207
EUROMED-JAVA: Trusted Third Party Services for securing medical Java applets….Pages 209-220
MPEG PTY-Marks: Cheap detection of embedded copyright data in DVD-video….Pages 221-240
DHWM: A scheme for managing watermarking keys in the Aquarelle multimedia distributed system….Pages 241-255
The “ticket” concept for copy control based on embedded signalling….Pages 257-274
Panel session: Watermarking….Pages 275-275
Authentication and payment in future mobile systems….Pages 277-293
Distributed temporary pseudonyms: A new approach for protecting location information in mobile communication networks….Pages 295-312
A mix-mediated anonymity service and its payment….Pages 313-327
A subjective metric of authentication….Pages 329-344
A sound logic for analysing electronic commerce protocols….Pages 345-360
Kerberos Version IV: Inductive analysis of the secrecy goals….Pages 361-375
Reviews
There are no reviews yet.