Michael K. Reiter (auth.), Joachim Biskup, Javier López (eds.)3540748342, 9783540748342
The 39 revised full papers presented were carefully reviewed and selected from 164 submissions. ESORICS is confirmed as the European research event in computer security; it presents original research contributions, case studies and implementation experiences addressing any aspect of computer security – in theory, mechanisms, applications, or practical experience.
Table of contents :
Front Matter….Pages –
Trustworthy Services and the Biological Analogy….Pages 1-1
Security of Multithreaded Programs by Compilation….Pages 2-18
Efficient Proving for Practical Distributed Access-Control Systems….Pages 19-37
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control….Pages 38-54
Pragmatic XML Access Control Using Off-the-Shelf RDBMS….Pages 55-71
Conditional Privacy-Aware Role Based Access Control….Pages 72-89
Satisfiability and Resiliency in Workflow Systems….Pages 90-105
Completeness of the Authentication Tests….Pages 106-121
SilentKnock : Practical, Provably Undetectable Authentication….Pages 122-138
Generalized Key Delegation for Hierarchical Identity-Based Encryption….Pages 139-154
Change-Impact Analysis of Firewall Policies….Pages 155-170
Fragmentation and Encryption to Enforce Privacy in Data Storage….Pages 171-186
Information Confinement, Privacy, and Security in RFID Systems….Pages 187-202
A Logic for State-Modifying Authorization Policies….Pages 203-218
Inductive Proofs of Computational Secrecy….Pages 219-234
What, Indeed, Is Intransitive Noninterference?….Pages 235-250
Traceability and Integrity of Execution in Distributed Workflow Management Systems….Pages 251-266
Dynamic Information Flow Control Architecture for Web Applications….Pages 267-282
Cloak: A Ten-Fold Way for Reliable Covert Communications….Pages 283-298
Efficient Password-Based Authenticated Key Exchange Without Public Information….Pages 299-310
Improved Anonymous Timed-Release Encryption….Pages 311-326
Encryption Techniques for Secure Database Outsourcing….Pages 327-342
Click Passwords Under Investigation….Pages 343-358
Graphical Password Authentication Using Cued Click Points….Pages 359-374
Obligations and Their Interaction with Programs….Pages 375-389
On the Privacy of Concealed Data Aggregation….Pages 390-405
Synthesizing Secure Protocols….Pages 406-421
A Cryptographic Model for Branching Time Security Properties – The Case of Contract Signing Protocols….Pages 422-437
Security Evaluation of Scenarios Based on the TCG’s TPM Specification….Pages 438-453
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods….Pages 454-468
Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links….Pages 469-484
Towards Modeling Trust Based Decisions: A Game Theoretic Approach….Pages 485-500
Extending the Common Services of eduGAIN with a Credential Conversion Service….Pages 501-514
Incorporating Temporal Capabilities in Existing Key Management Schemes….Pages 515-530
A Policy Language for Distributed Usage Control….Pages 531-546
Countering Statistical Disclosure with Receiver-Bound Cover Traffic….Pages 547-562
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack….Pages 563-577
Modular Access Control Via Strategic Rewriting….Pages 578-593
On the Automated Correction of Security Protocols Susceptible to a Replay Attack….Pages 594-609
Adaptive Soundness of Static Equivalence….Pages 610-625
Back Matter….Pages –
Reviews
There are no reviews yet.