Skip to main content
  • Conference proceedings
  • © 2004

Computer Security - ESORICS 2004

9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3193)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2004.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (27 papers)

  1. Front Matter

  2. Incorporating Dynamic Constraints in the Flexible Authorization Framework

    • Shiping Chen, Duminda Wijesekera, Sushil Jajodia
    Pages 1-16
  3. Access-Condition-Table-Driven Access Control for XML Databases

    • Naizhen Qi (Naishin Seki), Michiharu Kudo
    Pages 17-32
  4. An Algebra for Composing Enterprise Privacy Policies

    • Michael Backes, Markus Dürmuth, Rainer Steinwandt
    Pages 33-52
  5. Deriving, Attacking and Defending the GDOI Protocol

    • Catherine Meadows, Dusko Pavlovic
    Pages 53-72
  6. A Formalization of Anonymity and Onion Routing

    • S. Mauw, J. H. S. Verschuren, E. P. de Vink
    Pages 109-124
  7. Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics

    • Rainer Böhme, Andreas Westfeld
    Pages 125-140
  8. Comparison Between Two Practical Mix Designs

    • Claudia Díaz, Len Sassaman, Evelyne Dewitte
    Pages 141-159
  9. Signature Bouquets: Immutability for Aggregated/Condensed Signatures

    • Einar Mykletun, Maithili Narasimha, Gene Tsudik
    Pages 160-176
  10. Towards a Theory of Data Entanglement

    • James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
    Pages 177-192
  11. Portable and Flexible Document Access Control Mechanisms

    • Mikhail Atallah, Marina Bykova
    Pages 193-208
  12. Security Property Based Administrative Controls

    • Jon A. Solworth, Robert H. Sloan
    Pages 244-259
  13. A Vector Model of Trust for Developing Trustworthy Systems

    • Indrajit Ray, Sudip Chakraborty
    Pages 260-275
  14. Parameterized Authentication

    • Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran
    Pages 276-292
  15. Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks

    • Seyit A. Çamtepe, Bülent Yener
    Pages 293-308
  16. Hindering Eavesdropping via IPv6 Opportunistic Encryption

    • Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
    Pages 309-321

Other Volumes

  1. Computer Security – ESORICS 2004

Editors and Affiliations

  • University of Milan, Italy

    Pierangela Samarati

  • University of Newcastle, UK

    Peter Ryan

  • Institute for Security in Distributed Applications, Hamburg University of Technology, Hamburg, Germany

    Dieter Gollmann

  • Institut Eurecom, Sophia-Antipolis, France

    Refik Molva

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access