11. ESORICS 2006:
Hamburg,
Germany
Dieter Gollmann, Jan Meier, Andrei Sabelfeld (Eds.):
Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings.
Lecture Notes in Computer Science 4189 Springer 2006, ISBN 3-540-44601-X
- Michael P. Collins, Michael K. Reiter:
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.
1-17
- Vitaly Shmatikov, Ming-Hsiu Wang:
Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.
18-33
- Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan:
TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
34-48
- Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao:
Private Information Retrieval Using Trusted Hardware.
49-64
- Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama:
Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
65-80
- Cheun Ngen Chong, Sorin M. Iacob, Paul Koster, Javier Montaner, René van Buuren:
License Transfer in OMA-DRM.
81-96
- Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau:
Enhanced Security Architecture for Music Distribution on Mobile.
97-109
- Frédéric Besson, Guillaume Dufay, Thomas P. Jensen:
A Formal Model of Access Control for Mobile Interactive Devices.
110-126
- Philip W. L. Fong:
Discretionary Capability Confinement.
127-144
- Xibin Zhao, Kwok-Yan Lam, Guimin Luo, Siu Leung Chung, Ming Gu:
Minimal Threshold Closure.
145-155
- Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine:
Reducing the Dependence of SPKI/SDSI on PKI.
156-173
- Jason Crampton, Hemanth Khambhammettu:
Delegation in Role-Based Access Control.
174-191
- Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini:
Applying a Security Requirements Engineering Process.
192-206
- Hai Wang, Peng Liu:
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.
207-224
- Thomas Santen:
A Formal Framework for Confidentiality-Preserving Refinement.
225-242
- Boris Köpf, David A. Basin:
Timing-Sensitive Information Flow Analysis for Synchronous Systems.
243-262
- Jing Wang, Yoshiaki Takata, Hiroyuki Seki:
HBAC: A Model for History-Based Access Control and Its Model Checking.
263-278
- David A. Naumann:
From Coupling Relations to Mated Invariants for Checking Information Flow.
279-296
- Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter:
A Linear Logic of Authorization and Knowledge.
297-312
- Peter Y. A. Ryan, Steve A. Schneider:
Prêt à Voter with Re-encryption Mixes.
313-326
- Michael Backes, Christian Cachin, Alina Oprea:
Secure Key-Updating for Lazy Revocation.
327-346
- Mudhakar Srivatsa, Ling Liu:
Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems.
347-361
- Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay:
Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.
362-383
- Dusko Pavlovic, Catherine Meadows:
Deriving Secrecy in Key Establishment Protocols.
384-403
- Michael Backes, Birgit Pfitzmann, Michael Waidner:
Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
404-423
- Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters:
Conditional Reactive Simulatability.
424-443
- Martin Johns:
SessionSafe: Implementing XSS Immune Session Handling.
444-460
- Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner:
Policy-Driven Memory Protection for Reconfigurable Hardware.
461-478
- Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright:
Privacy-Preserving Queries on Encrypted Data.
479-495
- Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia:
Analysis of Policy Anomalies on Distributed Network Security Setups.
496-511
- Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo, Pedro Garcia-Teodoro:
Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.
512-526
- Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric:
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
527-546
Copyright © Fri Mar 12 17:10:48 2010
by Michael Ley (ley@uni-trier.de)