10. ESORICS 2005:
Milan,
Italy
Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann (Eds.):
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings.
Lecture Notes in Computer Science 3679 Springer 2005, ISBN 3-540-28963-1 BibTeX
- Barbara Simons:
Computerized Voting Machines: A View from the Trenches.
1-2
Electronic Edition (link) BibTeX
- Naizhen Qi, Michiharu Kudo:
XML Access Control with Policy Matching Tree.
3-23
Electronic Edition (link) BibTeX
- Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana:
Semantic Access Control Model: A Formal Specification.
24-43
Electronic Edition (link) BibTeX
- Rajeev Gupta, Manish Bhide:
A Generic XACML Based Declarative Authorization Scheme for Java.
44-63
Electronic Edition (link) BibTeX
- Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge:
Specification and Validation of Authorisation Constraints Using UML and OCL.
64-79
Electronic Edition (link) BibTeX
- Vijayalakshmi Atluri, Qi Guo:
Unified Index for Mobile Object Data and Authorizations.
80-97
Electronic Edition (link) BibTeX
- Manuel Hilty, David A. Basin, Alexander Pretschner:
On Obligations.
98-117
Electronic Edition (link) BibTeX
- David Chaum, Peter Y. A. Ryan, Steve A. Schneider:
A Practical Voter-Verifiable Election Scheme.
118-139
Electronic Edition (link) BibTeX
- Sabrina Tarento:
Machine-Checked Security Proofs of Cryptographic Signature Schemes.
140-158
Electronic Edition (link) BibTeX
- Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik:
Sanitizable Signatures.
159-177
Electronic Edition (link) BibTeX
- Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR.
178-196
Electronic Edition (link) BibTeX
- Aslan Askarov, Andrei Sabelfeld:
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study.
197-221
Electronic Edition (link) BibTeX
- Huafei Zhu, Feng Bao:
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications.
222-230
Electronic Edition (link) BibTeX
- Indrajit Ray, Nayot Poolsapassit:
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders.
231-246
Electronic Edition (link) BibTeX
- Lingyu Wang, Anyi Liu, Sushil Jajodia:
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
247-266
Electronic Edition (link) BibTeX
- Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade:
Towards a Theory of Intrusion Detection.
267-286
Electronic Edition (link) BibTeX
- João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
On Scalability and Modularisation in the Modelling of Network Security Systems.
287-304
Electronic Edition (link) BibTeX
- George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson:
Sybil-Resistant DHT Routing.
305-318
Electronic Edition (link) BibTeX
- Felix C. Freiling, Thorsten Holz, Georg Wicherski:
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
319-335
Electronic Edition (link) BibTeX
- Michael Backes:
Quantifying Probabilistic Information Flow in Computational Reactive Systems.
336-354
Electronic Edition (link) BibTeX
- Jay Ligatti, Lujo Bauer, David Walker:
Enforcing Non-safety Security Policies with Program Monitors.
355-373
Electronic Edition (link) BibTeX
- Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov:
Soundness of Formal Encryption in the Presence of Key-Cycles.
374-396
Electronic Edition (link) BibTeX
- Somesh Jha, Louis Kruger, Patrick McDaniel:
Privacy Preserving Clustering.
397-417
Electronic Edition (link) BibTeX
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
Abstractions Preserving Parameter Confidentiality.
418-437
Electronic Edition (link) BibTeX
- Fabio Massacci, John Mylopoulos, Nicola Zannone:
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation.
438-454
Electronic Edition (link) BibTeX
- Kristian Gjøsteen:
Security Notions for Disk Encryption.
455-474
Electronic Edition (link) BibTeX
- Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski:
Local View Attack on Anonymous Communication.
475-488
Electronic Edition (link) BibTeX
- Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols.
489-508
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:10:51 2009
by Michael Ley (ley@uni-trier.de)