Shiping Chen, Duminda Wijesekera, Sushil Jajodia (auth.), Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva (eds.)3540229876, 9783540229872, 9783540301080
The 27 revised full papers presented were carefully reviewed and selected from 159 submissions. Among the topics addressed are access control, authorization frameworks, privacy policies, security protocols, trusted computing, anonymity, information hiding, steganography, digital signature schemes, encrypted communication, information flow control, authentication, key distribution, public key cryptography, intrusion prevention, and attack discovery.
Table of contents :
Front Matter….Pages –
Incorporating Dynamic Constraints in the Flexible Authorization Framework….Pages 1-16
Access-Condition-Table-Driven Access Control for XML Databases….Pages 17-32
An Algebra for Composing Enterprise Privacy Policies….Pages 33-52
Deriving, Attacking and Defending the GDOI Protocol….Pages 53-72
Better Privacy for Trusted Computing Platforms….Pages 73-88
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol….Pages 89-108
A Formalization of Anonymity and Onion Routing….Pages 109-124
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics….Pages 125-140
Comparison Between Two Practical Mix Designs….Pages 141-159
Signature Bouquets: Immutability for Aggregated/Condensed Signatures….Pages 160-176
Towards a Theory of Data Entanglement….Pages 177-192
Portable and Flexible Document Access Control Mechanisms….Pages 193-208
Possibilistic Information Flow Control in the Presence of Encrypted Communication….Pages 209-224
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage….Pages 225-243
Security Property Based Administrative Controls….Pages 244-259
A Vector Model of Trust for Developing Trustworthy Systems….Pages 260-275
Parameterized Authentication….Pages 276-292
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks….Pages 293-308
Hindering Eavesdropping via IPv6 Opportunistic Encryption….Pages 309-321
On the Role of Key Schedules in Attacks on Iterated Ciphers….Pages 322-334
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts….Pages 335-351
A Host Intrusion Prevention System for Windows Operating Systems….Pages 352-368
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table….Pages 369-384
ARCHERR: Runtime Environment Driven Program Safety….Pages 385-406
Sets, Bags, and Rock and Roll….Pages 407-422
Redundancy and Diversity in Security….Pages 423-438
Discovering Novel Attack Strategies from INFOSEC Alerts….Pages 439-456
Back Matter….Pages –
Reviews
There are no reviews yet.