Computer Security – ESORICS 2009

14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

Editors:

ISBN: 978-3-642-04443-4 (Print) 978-3-642-04444-1 (Online)

Table of contents (42 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Network Security I

    1. No Access

      Book Chapter

      Pages 1-18

      Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones

    2. No Access

      Book Chapter

      Pages 19-36

      User-Centric Handling of Identity Agent Compromise

    3. No Access

      Book Chapter

      Pages 37-52

      The Coremelt Attack

    4. Information Flow

      1. No Access

        Book Chapter

        Pages 53-68

        Type-Based Analysis of PIN Processing APIs

      2. No Access

        Book Chapter

        Pages 69-85

        Declassification with Explicit Reference Points

      3. No Access

        Book Chapter

        Pages 86-103

        Tracking Information Flow in Dynamic Tree Structures

  3. Network Security II

    1. No Access

      Book Chapter

      Pages 104-119

      Lightweight Opportunistic Tunneling (LOT)

    2. No Access

      Book Chapter

      Pages 120-135

      Hide and Seek in Time — Robust Covert Timing Channels

    3. No Access

      Book Chapter

      Pages 136-151

      Authentic Time-Stamps for Archival Storage

    4. Language Based Security

      1. No Access

        Book Chapter

        Pages 152-167

        Towards a Theory of Accountability and Audit

      2. No Access

        Book Chapter

        Pages 168-183

        Reliable Evidence: Auditability by Typing

      3. No Access

        Book Chapter

        Pages 184-199

        PCAL: Language Support for Proof-Carrying Authorization Systems

  4. Network Security III

    1. No Access

      Book Chapter

      Pages 200-215

      ReFormat: Automatic Reverse Engineering of Encrypted Messages

    2. No Access

      Book Chapter

      Pages 216-231

      Protocol Normalization Using Attribute Grammars

    3. No Access

      Book Chapter

      Pages 232-249

      Automatically Generating Models for Botnet Detection

    4. Access Control

      1. No Access

        Book Chapter

        Pages 250-267

        Dynamic Enforcement of Abstract Separation of Duty Constraints

      2. No Access

        Book Chapter

        Pages 268-284

        Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging

      3. No Access

        Book Chapter

        Pages 285-302

        Requirements and Protocols for Inference-Proof Interactions in Information Systems

      Privacy - I

      1. No Access

        Book Chapter

        Pages 303-320

        A Privacy Preservation Model for Facebook-Style Social Network Systems

      2. No Access

        Book Chapter

        Pages 321-336

        New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing

previous Page of 3