Andrei Sabelfeld (auth.), Iliano Cervesato (eds.)3540769277, 9783540769279
Table of contents :
Front Matter….Pages –
Dimensions of Declassification in Theory and Practice….Pages 1-1
A Static Birthmark of Binary Executables Based on API Call Structure….Pages 2-16
Compiling C Programs into a Strongly Typed Assembly Language….Pages 17-32
Information Flow Testing….Pages 33-47
Large Scale Simulation of Tor:….Pages 48-54
Privacy Enhancing Credentials….Pages 55-61
Browser Based Agile E-Voting System….Pages 62-69
Risk Balance in Exchange Protocols….Pages 70-77
Scalable DRM System for Media Portability….Pages 78-85
Computational Semantics for Basic Protocol Logic – A Stochastic Approach….Pages 86-94
Management Advantages of Object Classification in Role-Based Access Control (RBAC)….Pages 95-110
An Integrated Model for Access Control and Information Flow Requirements….Pages 111-125
Digital Rights Management Using a Master Control Device….Pages 126-141
How to do Things with Cryptographic Protocols….Pages 142-149
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols….Pages 150-165
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming….Pages 166-180
Secure Verification of Location Claims with Simultaneous Distance Modification….Pages 181-195
Modeling and Virtualization for Secure Computing Environments….Pages 196-197
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces….Pages 198-211
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks….Pages 212-227
Masquerade Detection Based Upon GUI User Profiling in Linux Systems….Pages 228-239
One-Time Receiver Address in IPv6 for Protecting Unlinkability….Pages 240-246
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts….Pages 247-253
Combining Heterogeneous Classifiers for Network Intrusion Detection….Pages 254-260
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments….Pages 261-267
On Run-Time Enforcement of Policies….Pages 268-281
Static vs Dynamic Typing for Access Control in Pi-Calculus….Pages 282-296
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications….Pages 297-311
Back Matter….Pages –
Reviews
There are no reviews yet.