New Added

Computer Security – ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings

Like Score+418

Computer Security – ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings
Original Title Computer Security – ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings
Author European Symposium on Research in Computer Security (9th : 2004 : Sophia Antipolis, France), Samarati, Pierangela
Publication date

Topics Computer security, Sécurité informatique, Sécurité informatique
Publisher Berlin , New York : Springer
Collection folkscanomy_miscellaneous, folkscanomy, additional_collections
Language English
Book Type EBook
Material Type Book
File Type PDF
Downloadable Yes
Support Mobile, Desktop, Tablet
Scan Quality: Best No watermark
PDF Quality: Good
Availability Yes
Price 0.00
Submitted By
Sketch the Cow
Submit Date
Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 – 15, 2004. Proceedings
Author: Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-22987-2
DOI: 10.1007/b100085

Table of Contents:

  • Incorporating Dynamic Constraints in the Flexible Authorization Framework
  • Access-Condition-Table-Driven Access Control for XML Databases
  • An Algebra for Composing Enterprise Privacy Policies
  • Deriving, Attacking and Defending the GDOI Protocol
  • Better Privacy for Trusted Computing Platforms
  • A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
  • A Formalization of Anonymity and Onion Routing
  • Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics
  • Comparison Between Two Practical Mix Designs
  • Signature Bouquets: Immutability for Aggregated/Condensed Signatures
  • Towards a Theory of Data Entanglement
  • Portable and Flexible Document Access Control Mechanisms
  • Possibilistic Information Flow Control in the Presence of Encrypted Communication
  • Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage
  • Security Property Based Administrative Controls
  • A Vector Model of Trust for Developing Trustworthy Systems
  • Parameterized Authentication
  • Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
  • Hindering Eavesdropping via IPv6 Opportunistic Encryption
  • On the Role of Key Schedules in Attacks on Iterated Ciphers
We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account
Reset Password
Compare items
  • Total (0)
Compare
0