Computer Security – ESORICS 2007

12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

  • Editors
  • Joachim Biskup
  • Javier López
Conference proceedings ESORICS 2007

DOI: 10.1007/978-3-540-74835-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4734)

Table of contents (40 papers)

  1. Front Matter
  2. Invited Lecture

  3. Security Architecture and Secure Components I

    1. Security of Multithreaded Programs by Compilation
      Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld
      Pages 2-18
    2. Efficient Proving for Practical Distributed Access-Control Systems
      Lujo Bauer, Scott Garriss, Michael K. Reiter
      Pages 19-37
  4. Access Control I

    1. Pragmatic XML Access Control Using Off-the-Shelf RDBMS
      Bo Luo, Dongwon Lee, Peng Liu
      Pages 55-71
    2. Conditional Privacy-Aware Role Based Access Control
      Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
      Pages 72-89
    3. Satisfiability and Resiliency in Workflow Systems
      Qihua Wang, Ninghui Li
      Pages 90-105
  5. Applied Cryptography I

    1. Completeness of the Authentication Tests
      Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
      Pages 106-121
    2. SilentKnock: Practical, Provably Undetectable Authentication
      Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra
      Pages 122-138
    3. Generalized Key Delegation for Hierarchical Identity-Based Encryption
      Michel Abdalla, Eike Kiltz, Gregory Neven
      Pages 139-154
    4. Security Management and Secure Electronic Activities

      1. Fragmentation and Encryption to Enforce Privacy in Data Storage
        Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
        Pages 171-186
      2. Information Confinement, Privacy, and Security in RFID Systems
        Roberto Di Pietro, Refik Molva
        Pages 187-202
  6. Formal Methods in Security I

    1. A Logic for State-Modifying Authorization Policies
      Moritz Y. Becker, Sebastian Nanz
      Pages 203-218
    2. Inductive Proofs of Computational Secrecy
      Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
      Pages 219-234
    3. What, Indeed, Is Intransitive Noninterference?
      Ron van der Meyden
      Pages 235-250
    4. Information Control and Access Control

      1. Dynamic Information Flow Control Architecture for Web Applications
        Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudoh, Kazuko Oyanagi
        Pages 267-282
      2. Cloak: A Ten-Fold Way for Reliable Covert Communications
        Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
        Pages 283-298

About these proceedings


DBMS Workflow Management authorization schemes communication computer security cryptography data security denial-of-service attacks digital signatures electronic voting identity intrusion detection network security secure communications security

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-74834-2
  • Online ISBN 978-3-540-74835-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349