×
Loading...

Computer Security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings by European Symposium on Research in Comput...

Book Information

TitleComputer Security - ESORICS 2004 : 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13-15, 2004 : proceedings
CreatorEuropean Symposium on Research in Computer Security (9th : 2004 : Sophia Antipolis, France), Samarati, Pierangela
Year2004
PPI300
PublisherBerlin ; New York : Springer
LanguageEnglish
Mediatypetexts
SubjectComputer security, Sécurité informatique, Sécurité informatique
ISBN3540229876, 9783540229872
Collectionfolkscanomy_miscellaneous, folkscanomy, additional_collections
Uploadersketch
Identifierspringer_10.1007-b100085
Telegram icon Share on Telegram
Download Now

Description

Computer Security – ESORICS 2004: 9th European Symposium on Research in Computer Security, Sophia Antipolis, France, September 13 - 15, 2004. ProceedingsAuthor: Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva Published by Springer Berlin Heidelberg ISBN: 978-3-540-22987-2 DOI: 10.1007/b100085Table of Contents:Incorporating Dynamic Constraints in the Flexible Authorization Framework Access-Condition-Table-Driven Access Control for XML Databases An Algebra for Composing Enterprise Privacy Policies Deriving, Attacking and Defending the GDOI Protocol Better Privacy for Trusted Computing Platforms A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol A Formalization of Anonymity and Onion Routing Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics Comparison Between Two Practical Mix Designs Signature Bouquets: Immutability for Aggregated/Condensed Signatures Towards a Theory of Data Entanglement Portable and Flexible Document Access Control Mechanisms Possibilistic Information Flow Control in the Presence of Encrypted Communication Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage Security Property Based Administrative Controls A Vector Model of Trust for Developing Trustworthy Systems Parameterized Authentication Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks Hindering Eavesdropping via IPv6 Opportunistic Encryption On the Role of Key Schedules in Attacks on Iterated Ciphers