Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Computer Security -- ESORICS 2009

14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings
Langbeschreibung
This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.
Inhaltsverzeichnis
Network Security I.- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones.- User-Centric Handling of Identity Agent Compromise.- The Coremelt Attack.- Type-Based Analysis of PIN Processing APIs.- Declassification with Explicit Reference Points.- Tracking Information Flow in Dynamic Tree Structures.- Network Security II.- Lightweight Opportunistic Tunneling (LOT).- Hide and Seek in Time - Robust Covert Timing Channels.- Authentic Time-Stamps for Archival Storage.- Towards a Theory of Accountability and Audit.- Reliable Evidence: Auditability by Typing.- PCAL: Language Support for Proof-Carrying Authorization Systems.- Network Security III.- ReFormat: Automatic Reverse Engineering of Encrypted Messages.- Protocol Normalization Using Attribute Grammars.- Automatically Generating Models for Botnet Detection.- Dynamic Enforcement of Abstract Separation of Duty Constraints.- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging.- Requirements and Protocols for Inference-Proof Interactions in Information Systems.- A Privacy Preservation Model for Facebook-Style Social Network Systems.- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing.- Secure Pseudonymous Channels.- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing.- Content Delivery Networks: Protection or Threat?.- Model-Checking DoS Amplification for VoIP Session Initiation.- The Wisdom of Crowds: Attacks and Optimal Constructions.- Secure Evaluation of Private Linear Branching Programs with Medical Applications.- Keep a Few: Outsourcing Data While Maintaining Confidentiality.- Data Structures with Unpredictable Timing.- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance.- Corruption-Localizing Hashing.- Isolating JavaScript with Filters, Rewriting, and Wrappers.- An Effective Method for Combating Malicious Scripts Clickbots.- Client-Side Detectionof XSS Worms by Monitoring Payload Propagation.- Formal Indistinguishability Extended to the Random Oracle Model.- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol.- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption.- A Generic Security API for Symmetric Key Management on Cryptographic Devices.- ID-Based Secure Distance Bounding and Localization.- Secure Ownership and Ownership Transfer in RFID Systems.- Cumulative Attestation Kernels for Embedded Systems.- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries.- Set Covering Problems in Role-Based Access Control.
ISBN-13:
9783642044441
Veröffentl:
2009
Seiten:
706
Autor:
Michael Backes
Serie:
5789, Lecture Notes in Computer Science Security and Cryptology
eBook Typ:
PDF
eBook Format:
EPUB
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch

96,29 €*

Lieferzeit: Sofort lieferbar
Alle Preise inkl. MwSt.