Computer Security -- ESORICS 2002
Springer Berlin (Verlag)
978-3-540-44345-2 (ISBN)
Computational Probabilistic Non-interference.- Bit-Slice Auction Circuit.- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.- Cardinality-Based Inference Control in Sum-Only Data Cubes.- Outbound Authentication for Programmable Secure Coprocessors.- Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense.- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations.- Authentication for Distributed Web Caches.- Analysing a Stream Authentication Protocol Using Model Checking.- Equal To The Task?.- TINMAN: A Resource Bound Security Checking System for Mobile Code.- Confidentiality-Preserving Refinement is Compositional - Sometimes.- Formal Security Analysis with Interacting State Machines.- Decidability of Safety in Graph-Based Models for Access Control.- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.- Learning Fingerprints for a Database Intrusion Detection System.
Erscheint lt. Verlag | 30.9.2002 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | CCCVIII, 298 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 435 g |
Themenwelt | Mathematik / Informatik ► Informatik ► Betriebssysteme / Server |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | Access Control • authentication • Code • Computer Security • Digital Payment • Electronic Commerce • Formal Security Analysis • Hardcover, Softcover / Informatik, EDV/Betriebssysteme, Benutzeroberflächen • HC/Informatik, EDV/Betriebssysteme, Benutzeroberflächen • Internet Security • Mobile Code • Network Security • privacy • secure networks • security • web service security |
ISBN-10 | 3-540-44345-2 / 3540443452 |
ISBN-13 | 978-3-540-44345-2 / 9783540443452 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich