10. ESORICS 2005:
Milan,
Italy
Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann (Eds.):
Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings.
Lecture Notes in Computer Science 3679 Springer 2005, ISBN 3-540-28963-1
- Barbara Simons:
Computerized Voting Machines: A View from the Trenches.
1-2
- Naizhen Qi, Michiharu Kudo:
XML Access Control with Policy Matching Tree.
3-23
- Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana:
Semantic Access Control Model: A Formal Specification.
24-43
- Rajeev Gupta, Manish Bhide:
A Generic XACML Based Declarative Authorization Scheme for Java.
44-63
- Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge:
Specification and Validation of Authorisation Constraints Using UML and OCL.
64-79
- Vijayalakshmi Atluri, Qi Guo:
Unified Index for Mobile Object Data and Authorizations.
80-97
- Manuel Hilty, David A. Basin, Alexander Pretschner:
On Obligations.
98-117
- David Chaum, Peter Y. A. Ryan, Steve A. Schneider:
A Practical Voter-Verifiable Election Scheme.
118-139
- Sabrina Tarento:
Machine-Checked Security Proofs of Cryptographic Signature Schemes.
140-158
- Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik:
Sanitizable Signatures.
159-177
- Michael Backes, Birgit Pfitzmann:
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR.
178-196
- Aslan Askarov, Andrei Sabelfeld:
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study.
197-221
- Huafei Zhu, Feng Bao:
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications.
222-230
- Indrajit Ray, Nayot Poolsapassit:
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders.
231-246
- Lingyu Wang, Anyi Liu, Sushil Jajodia:
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
247-266
- Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade:
Towards a Theory of Intrusion Detection.
267-286
- João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus:
On Scalability and Modularisation in the Modelling of Network Security Systems.
287-304
- George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson:
Sybil-Resistant DHT Routing.
305-318
- Felix C. Freiling, Thorsten Holz, Georg Wicherski:
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
319-335
- Michael Backes:
Quantifying Probabilistic Information Flow in Computational Reactive Systems.
336-354
- Jay Ligatti, Lujo Bauer, David Walker:
Enforcing Non-safety Security Policies with Program Monitors.
355-373
- Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov:
Soundness of Formal Encryption in the Presence of Key-Cycles.
374-396
- Somesh Jha, Louis Kruger, Patrick McDaniel:
Privacy Preserving Clustering.
397-417
- Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph:
Abstractions Preserving Parameter Confidentiality.
418-437
- Fabio Massacci, John Mylopoulos, Nicola Zannone:
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation.
438-454
- Kristian Gjøsteen:
Security Notions for Disk Encryption.
455-474
- Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski:
Local View Attack on Anonymous Communication.
475-488
- Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi:
Browser Model for Security Analysis of Browser-Based Protocols.
489-508
Copyright © Sun Mar 14 23:02:56 2010
by Michael Ley (ley@uni-trier.de)