SEC 2004:
Toulouse,
France
Yves Deswarte, Frédéric Cuppens, Sushil Jajodia, Lingyu Wang (Eds.):
Security and Protection in Information Processing Systems, IFIP 18th WorldComputer Congress, TC11 19th International Information Security Conference, 22-27 August 2004, Toulouse, France.
Kluwer 2004, ISBN 1-4020-8142-1 BibTeX
- Mohamed Hamdi, Noureddine Boudriga:
An Abstract Reduction Model for Computer Security Risk.
1-16 BibTeX
- Vipin Swarup:
Remediation Graphs for Security Patch Management.
17-28 BibTeX
- Lam-for Kwok, Dennis Longley:
Security Modelling for Risk Analysis.
29-46 BibTeX
- Vincenzo Ciaschini, Roberto Gorrieri:
Contrasting Malicious Java Applets by Modifying the Java Virtual Machine.
47-64 BibTeX
- Gerrit Rothmaier, Andre Pohl, Heiko Krumm:
Analyzing Network Management Effects with SPIN and cTLA.
65-82 BibTeX
- Shuo Chen, Karthik Pattabiraman, Zbigniew Kalbarczyk, Ravishankar K. Iyer:
Formal Reasoning of Various Categories of Widely Exploited Security Vulnerabilities by Pointer Taintedness Semantics.
83-100 BibTeX
- Vijay Masurkar, Simone Fischer-Hübner, Morton Swimmer:
Meeting the Global Challenges of Security Incident Response.
101-118 BibTeX
- Petri Saloma, Ronja Addams-Moring, Teemupekka Virtanen:
Security in Globally Distributed Industrial Information Systems.
119-134 BibTeX
- Sebastiaan H. von Solms, M. P. Hertenberger:
A Case For Information Ownership in ERP Systems.
135-150 BibTeX
- Hristo Koshutanski, Fabio Massacci:
Interactive Access Control for Web Services.
151-166 BibTeX
- Yvo Desmedt, Mike Burmester:
Identity-based Key Infrastructures (IKI).
167-176 BibTeX
- Hiroaki Kikuchi, Junji Nakazato:
ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System.
177-192 BibTeX
- Semir Daskapan:
Dependable Security by Twisted Secret Sharing.
193-208 BibTeX
- Eric Totel, Bernard Vivinis, Ludovic Mé:
A Language Driven IDS for Event and Alert Correlation.
209-224 BibTeX
- Danny Nebenzahl, Avishai Wool:
Install-time Vaccination of Windows Executables to Defend Against Stack Smashing Attacks.
225-240 BibTeX
- Yacine Bouzida, Sylvain Gombault:
Eigenconnections to Intrusion Detection.
241-258 BibTeX
- Stefan Axelsson:
Visualising Intrusions: Watching the Webserver.
259-274 BibTeX
- Paul Dowland, Steven Furnell:
A Long-term Trial of Keystroke Profiling using Digraph, Trigraph and Keyword Latencies.
275-290 BibTeX
- Martín Abadi:
Trusted Computing, Trusted Third Parties, and Verified Communications.
291-308 BibTeX
- Andrew Fritz, Jehan-François Pâris:
Maille Authentication - A Novel Protocol for Distributed Authentication.
309-322 BibTeX
- Yong Song, Victor C. M. Leung, Konstantin Beznosov:
Supporting End-to-end Security across Proxies with Multiple-Channel SSL.
323-338 BibTeX
- Pei-Ling Yu, Pan-Lung Tsai, Chin-Laung Lei:
A Content-Protection Scheme for Multi-Layered Reselling Structure.
339-350 BibTeX
- Konstantinos Rantos, Constantinos Markantonakis:
An Asymmetric Cryptography Secure Channel Protocol for Smart Cards.
351-366 BibTeX
- Antti Nuopponen, Sami Vaarala, Teemupekka Virtanen:
IPsec Clustering.
367-380 BibTeX
- Olivier Heen, Jean-Pierre Andreaux, Nicolas Prigent:
Improving Secure Device Insertion in Home Ad-hoc Networks Keyword Latencies.
381-394 BibTeX
- Flavio D. Garcia, Jaap-Henk Hoepman, Jeroen van Nieuwenhuizen:
Spam Filter Analysis.
395-410 BibTeX
- Indrajit Ray, Eunjong Kim:
Collective Signature for Efficient Authentication of XML Documents.
411-424 BibTeX
- Prakash Reddy, Robert N. Mayo, Eamonn O'Brien-Strain, Jim Rowson, Yuhong Xiong:
Updating Encrypted XML Documents on Untrusted Machines.
425-440 BibTeX
- Lubica Liskova, Martin Stanek:
Efficient Simultaneous Contract Signing.
441-456 BibTeX
- Jacques Demerjian, Ahmed Serhrouchni:
DHCP Authentication Using Certificates.
457-472 BibTeX
- Aleksey Kurchuk, Angelos D. Keromytis:
Recursive Sandboxes: Extending Systrace To Empower Applications.
473-488 BibTeX
- Vipul Goyal:
Fast Digital Certificate Revocation.
489-500 BibTeX
- Robert Pinto, Lucila Ishitani, Virgilio Almeida, Wagner Meira Jr., Fabiano A. Fonseca, Fernando D. O. Castro:
MASKS: Managing Anonymity while Sharing Knowledge to Servers.
501-516 BibTeX
- Idir Fodil, Vincent Jardin:
Security and Differentiated Hotspot Services Through Policy-based Management Architecture.
517-532 BibTeX
- Ayan Roy Chowdhury, John S. Baras:
Key Management for Secure Multicast in Hybrid Satellite Networks.
533-548 BibTeX
Copyright © Sat May 16 23:37:19 2009
by Michael Ley (ley@uni-trier.de)