9. ESORICS 2004:
Sophia Antipolis,
French Riviera,
France
Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva (Eds.):
Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings.
Lecture Notes in Computer Science 3193 Springer 2004, ISBN 3-540-22987-6 @proceedings{DBLP:conf/esorics/2004,
editor = {Pierangela Samarati and
Peter Y. A. Ryan and
Dieter Gollmann and
Refik Molva},
title = {Computer Security - ESORICS 2004, 9th European Symposium on Research
Computer Security, Sophia Antipolis, France, September 13-15,
2004, Proceedings},
booktitle = {ESORICS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {3193},
year = {2004},
isbn = {3-540-22987-6},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Shiping Chen, Duminda Wijesekera, Sushil Jajodia:
Incorporating Dynamic Constraints in the Flexible Authorization Framework.
1-16
- Naizhen Qi, Michiharu Kudo:
Access-Condition-Table-Driven Access Control for XML Databases.
17-32
- Michael Backes, Markus Dürmuth, Rainer Steinwandt:
An Algebra for Composing Enterprise Privacy Policies.
33-52
- Catherine Meadows, Dusko Pavlovic:
Deriving, Attacking and Defending the GDOI Protocol.
53-72
- Jan Camenisch:
Better Privacy for Trusted Computing Platforms: (Extended Abstract).
73-88
- Michael Backes:
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.
89-108
- Sjouke Mauw, Jan Verschuren, Erik P. de Vink:
A Formalization of Anonymity and Onion Routing.
109-124
- Rainer Böhme, Andreas Westfeld:
Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics.
125-140
- Claudia Díaz, Len Sassaman, Evelyne Dewitte:
Comparison Between Two Practical Mix Designs.
141-159
- Einar Mykletun, Maithili Narasimha, Gene Tsudik:
Signature Bouquets: Immutability for Aggregated/Condensed Signatures.
160-176
- James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong:
Towards a Theory of Data Entanglement: (Extended Abstract).
177-192
- Mikhail J. Atallah, Marina Bykova:
Portable and Flexible Document Access Control Mechanisms.
193-208
- Dieter Hutter, Axel Schairer:
Possibilistic Information Flow Control in the Presence of Encrypted Communication.
209-224
- David von Oheimb:
Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage.
225-243
- Jon A. Solworth, Robert H. Sloan:
Security Property Based Administrative Controls.
244-259
- Indrajit Ray, Sudip Chakraborty:
A Vector Model of Trust for Developing Trustworthy Systems.
260-275
- Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran:
Parameterized Authentication.
276-292
- Seyit Ahmet Çamtepe, Bülent Yener:
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks.
293-308
- Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann:
Hindering Eavesdropping via IPv6 Opportunistic Encryption.
309-321
- Lars R. Knudsen, John Erik Mathiassen:
On the Role of Key Schedules in Attacks on Iterated Ciphers.
322-334
- Bodo Möller:
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts.
335-351
- Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini:
A Host Intrusion Prevention System for Windows Operating Systems.
352-368
- Julian B. Grizzard, John G. Levine, Henry L. Owen:
Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.
369-384
- Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya:
ARCHERR: Runtime Environment Driven Program Safety.
385-406
- John McHugh:
Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data.
407-422
- Bev Littlewood, Lorenzo Strigini:
Redundancy and Diversity in Security.
423-438
- Xinzhou Qin, Wenke Lee:
Discovering Novel Attack Strategies from INFOSEC Alerts.
439-456
Copyright © Sun Mar 14 23:02:56 2010
by Michael Ley (ley@uni-trier.de)