Computerized Voting Machines: A View from the Trenches |
|
|
|
1 | (2) |
XML Access Control with Policy Matching Tree |
|
|
Naizhen Qi, Michiharu Kudo |
|
|
3 | (21) |
Semantic Access Control Model: A Formal Specification |
|
|
Mariemma Yagüe, Maria-del-Mar Gallardo, Antonio Maña |
|
|
24 | (20) |
A Generic XACML Based Declarative Authorization Scheme for Java – Architecture and Implementation |
|
|
Rajeev Gupta, Manish Bhide |
|
|
44 | (20) |
Specification and Validation of Authorisation Constraints Using UML and OCL |
|
|
Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge |
|
|
64 | (16) |
Unified Index for Mobile Object Data and Authorizations |
|
|
Vijayalakshmi Atluri, Qi Guo |
|
|
80 | (18) |
On Obligations |
|
|
Manuel Hilty, David Basin, Alexander Pretschner |
|
|
98 | (20) |
A Practical Voter-Verifiable Election Scheme |
|
|
David Chaum, Peter Y.A. Ryan, Steve Schneider |
|
|
118 | (22) |
Machine-Checked Security Proofs of Cryptographic Signature Schemes |
|
|
|
140 | (19) |
Sanitizable Signatures |
|
|
Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik |
|
|
159 | (19) |
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR |
|
|
Michael Backes, Birgit Pfitzmann |
|
|
178 | (19) |
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study |
|
|
Aslan Askarov, Andrei Sabelfeld |
|
|
197 | (25) |
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications |
|
|
|
222 | (9) |
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders |
|
|
Indrajit Ray, Nayot Poolsapassit |
|
|
231 | (16) |
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts |
|
|
Lingyu Wang, Anyi Liu, Sushil Jajodia |
|
|
247 | (20) |
Towards a Theory of Intrusion Detection |
|
|
Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade |
|
|
267 | (20) |
On Scalability and Modularisation in the Modelling of Network Security Systems |
|
|
João Porto de Albuquerque, Heiko Krumm, Paulo Licio de Geus |
|
|
287 | (18) |
Sybil-Resistant DHT Routing |
|
|
George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross Anderson |
|
|
305 | (14) |
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks |
|
|
Felix C. Freiling, Thorsten Holz, Georg Wicherski |
|
|
319 | (17) |
Quantifying Probabilistic Information Flow in Computational Reactive Systems |
|
|
|
336 | (19) |
Enforcing Non-safety Security Policies with Program Monitors |
|
|
Jay Ligatti, Lujo Bauer, David Walker |
|
|
355 | (19) |
Soundness of Formal Encryption in the Presence of Key-Cycles |
|
|
Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov |
|
|
374 | (23) |
Privacy Preserving Clustering |
|
|
Somesh Jha, Luis Kruger, Patrick McDaniel |
|
|
397 | (21) |
Abstractions Preserving Parameter Confidentiality |
|
|
Sigrid Gürgens, Peter Ochsenschäldger, Carsten Rudolph |
|
|
418 | (20) |
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation |
|
|
Fabio Massacci, John Mylopoulos, Nicola Zannone |
|
|
438 | (17) |
Security Notions for Disk Encryption |
|
|
|
455 | (20) |
Local View Attack on Anonymous Communication |
|
|
Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski |
|
|
475 | (14) |
Browser Model for Security Analysis of Browser-Based Protocols |
|
|
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi |
|
|
489 | (20) |
Author Index |
|
509 | |