Computer Security - ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings

by ;
Format: Paperback
Pub. Date: 2005-12-16
Publisher(s): Springer Verlag
List Price: $139.00

Rent Textbook

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:30 Days access
Downloadable:30 Days
$19.80
Online:60 Days access
Downloadable:60 Days
$26.40
Online:90 Days access
Downloadable:90 Days
$33.00
Online:120 Days access
Downloadable:120 Days
$39.60
Online:180 Days access
Downloadable:180 Days
$42.90
Online:1825 Days access
Downloadable:Lifetime Access
$65.99
*To support the delivery of the digital material to you, a digital delivery fee of $3.99 will be charged on each digital item.
$42.90*

New Textbook

We're Sorry
Sold Out

Used Textbook

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book constitutes the refereed proceedings of the 10th European Symposium on Research in Computer Security, ESORICS 2005, held in Milan, Italy in September 2005.The 27 revised full papers presented were carefully reviewed and selected from 159 submissions. Among the topics addressed are access control, security protocols, digital signature schemes, intrusion detection, voting systems, electronic voting, authorization, language-based security, network security, denial-of-service attacks, anonymous communications, and security analysis.

Table of Contents

Computerized Voting Machines: A View from the Trenches
Barbara Simons
1(2)
XML Access Control with Policy Matching Tree
Naizhen Qi, Michiharu Kudo
3(21)
Semantic Access Control Model: A Formal Specification
Mariemma Yagüe, Maria-del-Mar Gallardo, Antonio Maña
24(20)
A Generic XACML Based Declarative Authorization Scheme for Java – Architecture and Implementation
Rajeev Gupta, Manish Bhide
44(20)
Specification and Validation of Authorisation Constraints Using UML and OCL
Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge
64(16)
Unified Index for Mobile Object Data and Authorizations
Vijayalakshmi Atluri, Qi Guo
80(18)
On Obligations
Manuel Hilty, David Basin, Alexander Pretschner
98(20)
A Practical Voter-Verifiable Election Scheme
David Chaum, Peter Y.A. Ryan, Steve Schneider
118(22)
Machine-Checked Security Proofs of Cryptographic Signature Schemes
Sabrina Tarento
140(19)
Sanitizable Signatures
Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik
159(19)
Limits of the Cryptographic Realization of Dolev-Yao-Style XOR
Michael Backes, Birgit Pfitzmann
178(19)
Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study
Aslan Askarov, Andrei Sabelfeld
197(25)
Augmented Oblivious Polynomial Evaluation Protocol and Its Applications
Huafei Zhu, Feng Bao
222(9)
Using Attack Trees to Identify Malicious Attacks from Authorized Insiders
Indrajit Ray, Nayot Poolsapassit
231(16)
An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts
Lingyu Wang, Anyi Liu, Sushil Jajodia
247(20)
Towards a Theory of Intrusion Detection
Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade
267(20)
On Scalability and Modularisation in the Modelling of Network Security Systems
João Porto de Albuquerque, Heiko Krumm, Paulo Licio de Geus
287(18)
Sybil-Resistant DHT Routing
George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross Anderson
305(14)
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks
Felix C. Freiling, Thorsten Holz, Georg Wicherski
319(17)
Quantifying Probabilistic Information Flow in Computational Reactive Systems
Michael Backes
336(19)
Enforcing Non-safety Security Policies with Program Monitors
Jay Ligatti, Lujo Bauer, David Walker
355(19)
Soundness of Formal Encryption in the Presence of Key-Cycles
Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov
374(23)
Privacy Preserving Clustering
Somesh Jha, Luis Kruger, Patrick McDaniel
397(21)
Abstractions Preserving Parameter Confidentiality
Sigrid Gürgens, Peter Ochsenschäldger, Carsten Rudolph
418(20)
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Fabio Massacci, John Mylopoulos, Nicola Zannone
438(17)
Security Notions for Disk Encryption
Kristian Gjøsteen
455(20)
Local View Attack on Anonymous Communication
Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski
475(14)
Browser Model for Security Analysis of Browser-Based Protocols
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
489(20)
Author Index 509

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.