Barbara Simons (auth.), Sabrina de Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)3540289631, 9783540289630
Table of contents :
Front Matter….Pages –
Computerized Voting Machines: A View from the Trenches….Pages 1-2
XML Access Control with Policy Matching Tree….Pages 3-23
Semantic Access Control Model: A Formal Specification….Pages 24-43
A Generic XACML Based Declarative Authorization Scheme for Java….Pages 44-63
Specification and Validation of Authorisation Constraints Using UML and OCL….Pages 64-79
Unified Index for Mobile Object Data and Authorizations….Pages 80-97
On Obligations….Pages 98-117
A Practical Voter-Verifiable Election Scheme….Pages 118-139
Machine-Checked Security Proofs of Cryptographic Signature Schemes….Pages 140-158
Sanitizable Signatures….Pages 159-177
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR….Pages 178-196
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study….Pages 197-221
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications….Pages 222-230
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders….Pages 231-246
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts….Pages 247-266
Towards a Theory of Intrusion Detection….Pages 267-286
On Scalability and Modularisation in the Modelling of Network Security Systems….Pages 287-304
Sybil-Resistant DHT Routing….Pages 305-318
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks….Pages 319-335
Quantifying Probabilistic Information Flow in Computational Reactive Systems….Pages 336-354
Enforcing Non-safety Security Policies with Program Monitors….Pages 355-373
Soundness of Formal Encryption in the Presence of Key-Cycles….Pages 374-396
Privacy Preserving Clustering….Pages 397-417
Abstractions Preserving Parameter Confidentiality….Pages 418-437
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation….Pages 438-454
Security Notions for Disk Encryption….Pages 455-474
Local View Attack on Anonymous Communication….Pages 475-488
Browser Model for Security Analysis of Browser-Based Protocols….Pages 489-508
Back Matter….Pages –
Reviews
There are no reviews yet.