12. CCS 2005:
Alexandria,
VA,
USA
Vijay Atluri, Catherine Meadows, Ari Juels (Eds.):
Proceedings of the 12th ACM Conference on Computer and Communications Security, CCS 2005, Alexandria, VA, USA, November 7-11, 2005.
ACM 2005, ISBN 1-59593-226-7
Keynote address
Formal analysis of crypto protocols
Trust management
Privacy and anonymity
Authentication
Access control
Key management,
key exchange,
& pseudo-random generation
Intrusion detection and prevention
Security for diffuse computing
- Karl Krukow, Mogens Nielsen, Vladimiro Sassone:
A framework for concrete reputation-systems with applications to history-based access control.
260-269
- Shai Rubin, Mihai Christodorescu, Vinod Ganapathy, Jonathon T. Giffin, Louis Kruger, Hao Wang, Nicholas Kidd:
An auctioning reputation system based on anomaly.
270-279
- Matthew Yurkewych, Brian Neil Levine, Arnold L. Rosenberg:
On the cost-ineffectiveness of redundancy in commercial P2P computing.
280-288
- Mudhakar Srivatsa, Ling Liu:
Securing publish-subscribe overlay services with EventGuard.
289-298
Cryptography
Automated analysis
Attacking passwords and bringing down the network
Industry track invited talks
- Peter P. Swire:
Security market: incentives for disclosure of vulnerabilities.
405
- Guido Appenzeller:
Identity-based encryption from algorithm to enterprise deployment.
406
- Vance Bjorn:
Biometrics hit the mainstream: an analysis of security and privacy implications.
407
Copyright © Fri Mar 12 17:07:30 2010
by Michael Ley (ley@uni-trier.de)