Computer Security – ESORICS 2007

12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

  • Editors
  • Joachim Biskup
  • Javier López
Conference proceedings ESORICS 2007
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4734)

Table of contents

  1. Front Matter
  2. Invited Lecture

  3. Security Architecture and Secure Components I

    1. Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld
      Pages 2-18
    2. Lujo Bauer, Scott Garriss, Michael K. Reiter
      Pages 19-37
  4. Access Control I

    1. Bo Luo, Dongwon Lee, Peng Liu
      Pages 55-71
    2. Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
      Pages 72-89
    3. Qihua Wang, Ninghui Li
      Pages 90-105
  5. Applied Cryptography I

    1. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
      Pages 106-121
    2. Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra
      Pages 122-138
    3. Michel Abdalla, Eike Kiltz, Gregory Neven
      Pages 139-154
    4. Security Management and Secure Electronic Activities

      1. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
        Pages 171-186
      2. Roberto Di Pietro, Refik Molva
        Pages 187-202
  6. Formal Methods in Security I

    1. Moritz Y. Becker, Sebastian Nanz
      Pages 203-218
    2. Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
      Pages 219-234
    3. Ron van der Meyden
      Pages 235-250
    4. Information Control and Access Control

      1. Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudoh, Kazuko Oyanagi
        Pages 267-282
      2. Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
        Pages 283-298

About these proceedings

Keywords

DBMS Workflow Management authorization schemes communication computer security cryptography data security denial-of-service attacks digital signatures electronic voting identity intrusion detection network security secure communications security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-74835-9
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-74834-2
  • Online ISBN 978-3-540-74835-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book