My Account Log in

1 option

Computer Security -- ESORICS 2009 : 14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings / edited by Michael Backes, Peng Ning.

SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online

View online
Format:
Book
Contributor:
Backes, Michael, editor.
Ning, Peng, editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 5789.
Security and Cryptology ; 5789
Language:
English
Subjects (All):
Computer security.
Data encryption (Computer science).
Coding theory.
Information theory.
Data structures (Computer science).
Computer science--Mathematics.
Computer science.
Electronic commerce.
Systems and Data Security.
Cryptology.
Coding and Information Theory.
Data Structures and Information Theory.
Discrete Mathematics in Computer Science.
e-Commerce/e-business.
Local Subjects:
Systems and Data Security.
Cryptology.
Coding and Information Theory.
Data Structures and Information Theory.
Discrete Mathematics in Computer Science.
e-Commerce/e-business.
Physical Description:
1 online resource (XVI, 706 pages).
Edition:
First edition 2009.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
System Details:
text file PDF
Summary:
This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009. The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.
Contents:
Network Security I
Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones
User-Centric Handling of Identity Agent Compromise
The Coremelt Attack
Type-Based Analysis of PIN Processing APIs
Declassification with Explicit Reference Points
Tracking Information Flow in Dynamic Tree Structures
Network Security II
Lightweight Opportunistic Tunneling (LOT)
Hide and Seek in Time - Robust Covert Timing Channels
Authentic Time-Stamps for Archival Storage
Towards a Theory of Accountability and Audit
Reliable Evidence: Auditability by Typing
PCAL: Language Support for Proof-Carrying Authorization Systems
Network Security III
ReFormat: Automatic Reverse Engineering of Encrypted Messages
Protocol Normalization Using Attribute Grammars
Automatically Generating Models for Botnet Detection
Dynamic Enforcement of Abstract Separation of Duty Constraints
Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging
Requirements and Protocols for Inference-Proof Interactions in Information Systems
A Privacy Preservation Model for Facebook-Style Social Network Systems
New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing
Secure Pseudonymous Channels
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Content Delivery Networks: Protection or Threat?
Model-Checking DoS Amplification for VoIP Session Initiation
The Wisdom of Crowds: Attacks and Optimal Constructions
Secure Evaluation of Private Linear Branching Programs with Medical Applications
Keep a Few: Outsourcing Data While Maintaining Confidentiality
Data Structures with Unpredictable Timing
WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance
Corruption-Localizing Hashing
Isolating JavaScript with Filters, Rewriting, and Wrappers
An Effective Method for Combating Malicious Scripts Clickbots
Client-Side Detection of XSS Worms by Monitoring Payload Propagation
Formal Indistinguishability Extended to the Random Oracle Model
Computationally Sound Analysis of a Probabilistic Contract Signing Protocol
Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption
A Generic Security API for Symmetric Key Management on Cryptographic Devices
ID-Based Secure Distance Bounding and Localization
Secure Ownership and Ownership Transfer in RFID Systems
Cumulative Attestation Kernels for Embedded Systems
Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries
Set Covering Problems in Role-Based Access Control.
Other Format:
Printed edition:
ISBN:
978-3-642-04444-1
9783642044441
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

Find

Home Release notes

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Find catalog Using Articles+ Using your account