Computer Security - ESORICS 2007
Springer Berlin (Verlag)
978-3-540-74834-2 (ISBN)
Joachim Biskup ist Professor für Informatik an der Universität Hildesheim, wo er die Arbeitsgruppe "Informationssysteme und Sicherheit" leitet. Er ist Autor und Koautor zahlreicher Veröffentlichungen über Berechenbarkeits- und Komplexitätstheorie, Informationssysteme und Sicherheit.
Invited Lecture.- Trustworthy Services and the Biological Analogy.- Security Architecture and Secure Components I.- Security of Multithreaded Programs by Compilation.- Efficient Proving for Practical Distributed Access-Control Systems.- Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control.- Access Control I.- Pragmatic XML Access Control Using Off-the-Shelf RDBMS.- Conditional Privacy-Aware Role Based Access Control.- Satisfiability and Resiliency in Workflow Systems.- Applied Cryptography I.- Completeness of the Authentication Tests.- SilentKnock: Practical, Provably Undetectable Authentication.- Generalized Key Delegation for Hierarchical Identity-Based Encryption.- Change-Impact Analysis of Firewall Policies.- Fragmentation and Encryption to Enforce Privacy in Data Storage.- Information Confinement, Privacy, and Security in RFID Systems.- Formal Methods in Security I.- A Logic for State-Modifying Authorization Policies.- Inductive Proofs of Computational Secrecy.- What, Indeed, Is Intransitive Noninterference?.- Traceability and Integrity of Execution in Distributed Workflow Management Systems.- Dynamic Information Flow Control Architecture for Web Applications.- Cloak: A Ten-Fold Way for Reliable Covert Communications.- Applied Cryptography II.- Efficient Password-Based Authenticated Key Exchange Without Public Information.- Improved Anonymous Timed-Release Encryption.- Encryption Techniques for Secure Database Outsourcing.- Access Control II.- Click Passwords Under Investigation.- Graphical Password Authentication Using Cued Click Points.- Obligations and Their Interaction with Programs.- Applied Cryptography III.- On the Privacy of Concealed Data Aggregation.- Synthesizing Secure Protocols.- A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.- Security Architecture and Secure Components II.- Security Evaluation of Scenarios Based on the TCG's TPM Specification.- Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.- Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links.- Towards Modeling Trust Based Decisions: A Game Theoretic Approach.- Extending the Common Services of eduGAIN with a Credential Conversion Service.- Incorporating Temporal Capabilities in Existing Key Management Schemes.- A Policy Language for Distributed Usage Control.- Countering Statistical Disclosure with Receiver-Bound Cover Traffic.- Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.- Formal Methods in Security III.- Modular Access Control Via Strategic Rewriting.- On the Automated Correction of Security Protocols Susceptible to a Replay Attack.- Adaptive Soundness of Static Equivalence.
Erscheint lt. Verlag | 12.9.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 628 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 959 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • authorization schemes • Communication • Computer Security • cryptographic protocols • cryptography • Data Security • DBMS • denial-of-service attacks • Digital Signatures • electronic voting • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity • Internet Security • Intrusion Detection • Network Security • PKI • privacy • Secure Communications • security • security proofs • security protocols • Systems Security • Workflow Management |
ISBN-10 | 3-540-74834-2 / 3540748342 |
ISBN-13 | 978-3-540-74834-2 / 9783540748342 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich