SEC 2004:
Toulouse,
France
Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (Eds.):
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France.
Kluwer 2004, ISBN 1-4020-8142-1
- Mohamed Hamdi, Noureddine Boudriga:
An Abstract Reduction Model for Computer Security Risk.
1-16
- Vipin Swarup:
Remediation Graphs for Security Patch Management.
17-28
- Lam-for Kwok, Dennis Longley:
Security Modelling for Risk Analysis.
29-46
- Vincenzo Ciaschini, Roberto Gorrieri:
Contrasting Malicious Java Applets by Modifying the Java Virtual Machine.
47-64
- Gerrit Rothmaier, Andre Pohl, Heiko Krumm:
Analyzing Network Management Effects with SPIN and cTLA.
65-82
- Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
83-100
- Vijay Masurkar, Simone Fischer-Hübner, Morton Swimmer:
Meeting the Global Challenges of Security Incident Response.
101-118
- Petri Saloma, Ronja Addams-Moring, Teemupekka Virtanen:
Security in Globally Distributed Industrial Information Systems.
119-134
- Sebastiaan H. von Solms, M. P. Hertenberger:
A Case For Information Ownership in ERP Systems.
135-150
- Hristo Koshutanski, Fabio Massacci:
Interactive Access Control for Web Services.
151-166
- Yvo Desmedt, Mike Burmester:
Identity-based Key Infrastructures (IKI).
167-176
- Hiroaki Kikuchi, Junji Nakazato:
ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System.
177-192
- Semir Daskapan:
Dependable Security by Twisted Secret Sharing.
193-208
- Eric Totel, Bernard Vivinis, Ludovic Mé:
A Language Driven IDS for Event and Alert Correlation.
209-224
- Danny Nebenzahl, Avishai Wool:
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.
225-240
- Yacine Bouzida, Sylvain Gombault:
Eigenconnections to Intrusion Detection.
241-258
- Stefan Axelsson:
Visualising Intrusions: Watching the Webserver.
259-274
- Paul Dowland, Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
275-290
- Martín Abadi:
Trusted Computing, Trusted Third Parties, and Verified Communications.
291-308
- Andrew Fritz, Jehan-François Pâris:
Maille Authentication - A Novel Protocol for Distributed Authentication.
309-322
- Yong Song, Victor C. M. Leung, Konstantin Beznosov:
Supporting End-to-end Security across Proxies with Multiple-Channel SSL.
323-338
- Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei:
A Content-Protection Scheme for Multi-Layered Reselling Structure.
339-350
- Konstantinos Rantos, Constantinos Markantonakis:
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.
351-366
- Antti Nuopponen, Sami Vaarala, Teemupekka Virtanen:
IPsec Clustering.
367-380
- Olivier Heen, Jean-Pierre Andreaux, Nicolas Prigent:
Improving Secure Device Insertion in Home Ad-hoc Networks Keyword Latencies.
381-394
- Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen:
Spam Filter Analysis.
395-410
- Indrajit Ray, Eunjong Kim:
Collective Signature for Efficient Authentication of XML Documents.
411-424
- Prakash Reddy, Robert N. Mayo, Eamonn O'Brien-Strain, Jim Rowson, Yuhong Xiong:
Updating Encrypted XML Documents on Untrusted Machines.
425-440
- Lubica Liskova, Martin Stanek:
Efficient Simultaneous Contract Signing.
441-456
- Jacques Demerjian, Ahmed Serhrouchni:
DHCP Authentication Using Certificates.
457-472
- Aleksey Kurchuk, Angelos D. Keromytis:
Recursive Sandboxes: Extending Systrace To Empower Applications.
473-488
- Vipul Goyal:
Fast Digital Certificate Revocation.
489-500
- Robert Pinto, Lucila Ishitani, Virgilio Almeida, Wagner Meira Jr., Fabiano A. Fonseca, Fernando D. O. Castro:
MASKS: Managing Anonymity while Sharing Knowledge to Servers.
501-516
- Idir Fodil, Vincent Jardin:
Security and Differentiated Hotspot Services Through Policy-based Management Architecture.
517-532
- Ayan Roy Chowdhury, John S. Baras:
Key Management for Secure Multicast in Hybrid Satellite Networks.
533-548
Copyright © Sun Mar 14 23:24:00 2010
by Michael Ley (ley@uni-trier.de)