Computer Security – ESORICS 2005

10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005. Proceedings

ISBN: 978-3-540-28963-0 (Print) 978-3-540-31981-8 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. No Access

    Book Chapter

    Pages 1-2

    Computerized Voting Machines: A View from the Trenches

  3. No Access

    Book Chapter

    Pages 3-23

    XML Access Control with Policy Matching Tree

  4. No Access

    Book Chapter

    Pages 24-43

    Semantic Access Control Model: A Formal Specification

  5. No Access

    Book Chapter

    Pages 44-63

    A Generic XACML Based Declarative Authorization Scheme for Java

  6. No Access

    Book Chapter

    Pages 64-79

    Specification and Validation of Authorisation Constraints Using UML and OCL

  7. No Access

    Book Chapter

    Pages 80-97

    Unified Index for Mobile Object Data and Authorizations

  8. No Access

    Book Chapter

    Pages 98-117

    On Obligations

  9. No Access

    Book Chapter

    Pages 118-139

    A Practical Voter-Verifiable Election Scheme

  10. No Access

    Book Chapter

    Pages 140-158

    Machine-Checked Security Proofs of Cryptographic Signature Schemes

  11. No Access

    Book Chapter

    Pages 159-177

    Sanitizable Signatures

  12. No Access

    Book Chapter

    Pages 178-196

    Limits of the Cryptographic Realization of Dolev-Yao-Style XOR

  13. No Access

    Book Chapter

    Pages 197-221

    Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study

  14. No Access

    Book Chapter

    Pages 222-230

    Augmented Oblivious Polynomial Evaluation Protocol and Its Applications

  15. No Access

    Book Chapter

    Pages 231-246

    Using Attack Trees to Identify Malicious Attacks from Authorized Insiders

  16. No Access

    Book Chapter

    Pages 247-266

    An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts

  17. No Access

    Book Chapter

    Pages 267-286

    Towards a Theory of Intrusion Detection

  18. No Access

    Book Chapter

    Pages 287-304

    On Scalability and Modularisation in the Modelling of Network Security Systems

  19. No Access

    Book Chapter

    Pages 305-318

    Sybil-Resistant DHT Routing

  20. No Access

    Book Chapter

    Pages 319-335

    Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks

  21. No Access

    Book Chapter

    Pages 336-354

    Quantifying Probabilistic Information Flow in Computational Reactive Systems

previous Page of 2