Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 – 15, 2004. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 3193

ISBN: 3540229876, 9783540229872, 9783540301080

Size: 11 MB (11868295 bytes)

Pages: 457/471

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Shiping Chen, Duminda Wijesekera, Sushil Jajodia (auth.), Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva (eds.)3540229876, 9783540229872, 9783540301080

This book constitutes the refereed proceedings of the 9th European Symposium on Research in Computer Security, ESORICS 2004, held in Sophia Antipolis, France in September 2004.

The 27 revised full papers presented were carefully reviewed and selected from 159 submissions. Among the topics addressed are access control, authorization frameworks, privacy policies, security protocols, trusted computing, anonymity, information hiding, steganography, digital signature schemes, encrypted communication, information flow control, authentication, key distribution, public key cryptography, intrusion prevention, and attack discovery.


Table of contents :
Front Matter….Pages –
Incorporating Dynamic Constraints in the Flexible Authorization Framework….Pages 1-16
Access-Condition-Table-Driven Access Control for XML Databases….Pages 17-32
An Algebra for Composing Enterprise Privacy Policies….Pages 33-52
Deriving, Attacking and Defending the GDOI Protocol….Pages 53-72
Better Privacy for Trusted Computing Platforms….Pages 73-88
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol….Pages 89-108
A Formalization of Anonymity and Onion Routing….Pages 109-124
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics….Pages 125-140
Comparison Between Two Practical Mix Designs….Pages 141-159
Signature Bouquets: Immutability for Aggregated/Condensed Signatures….Pages 160-176
Towards a Theory of Data Entanglement….Pages 177-192
Portable and Flexible Document Access Control Mechanisms….Pages 193-208
Possibilistic Information Flow Control in the Presence of Encrypted Communication….Pages 209-224
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage….Pages 225-243
Security Property Based Administrative Controls….Pages 244-259
A Vector Model of Trust for Developing Trustworthy Systems….Pages 260-275
Parameterized Authentication….Pages 276-292
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks….Pages 293-308
Hindering Eavesdropping via IPv6 Opportunistic Encryption….Pages 309-321
On the Role of Key Schedules in Attacks on Iterated Ciphers….Pages 322-334
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts….Pages 335-351
A Host Intrusion Prevention System for Windows Operating Systems….Pages 352-368
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table….Pages 369-384
ARCHERR: Runtime Environment Driven Program Safety….Pages 385-406
Sets, Bags, and Rock and Roll….Pages 407-422
Redundancy and Diversity in Security….Pages 423-438
Discovering Novel Attack Strategies from INFOSEC Alerts….Pages 439-456
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 – 15, 2004. Proceedings”
Shopping Cart
Scroll to Top