Advertisement

Computer Security - ESORICS 2008

13th European Symposium on Research in Computer Security, Málaga, Spain, October 6-8, 2008. Proceedings

  • Sushil Jajodia
  • Javier Lopez

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5283)

Table of contents

  1. Front Matter
  2. Session 1: Intrusion Detection and Network Vulnerability Analysis

    1. Reginald E. Sawilla, Xinming Ou
      Pages 18-34
    2. C. P. Mu, X. J. Li, H. K. Huang, S. F. Tian
      Pages 35-48
  3. Session 2: Network Security

    1. Rosario Gennaro, Shai Halevi, Hugo Krawczyk, Tal Rabin, Steffen Reidt, Stephen D. Wolthusen
      Pages 49-65
    2. Gelareh Taban, Virgil D. Gligor
      Pages 66-81
    3. Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X. Liu
      Pages 82-96
  4. Session 3: Smart Cards and Identity Management

    1. Flavio D. Garcia, Gerhard de Koning Gans, Ruben Muijrers, Peter van Rossum, Roel Verdult, Ronny Wichers Schreur et al.
      Pages 97-114
    2. Sebastian Gajek, Tibor Jager, Mark Manulis, Jörg Schwenk
      Pages 115-129
  5. Session 4: Data and Applications Security

  6. Session 5: Privacy Enhancing Technologies

    1. Dan Bogdanov, Sven Laur, Jan Willemson
      Pages 192-206
    2. Athanassios N. Yannacopoulos, Costas Lambrinoudakis, Stefanos Gritzalis, Stylianos Z. Xanthopoulos, Sokratis N. Katsikas
      Pages 207-222
    3. Ee-Chien Chang, Jia Xu
      Pages 223-237
  7. Session 6: Anonymity and RFID Privacy

    1. J. P. Muñoz-Gea, J. Malgosa-Sanahuja, P. Manzanares-Lopez, J. C. Sanchez-Aarnoutse, J. Garcia-Haro
      Pages 238-250
    2. Ching Yu Ng, Willy Susilo, Yi Mu, Rei Safavi-Naini
      Pages 251-266
    3. JungHoon Ha, SangJae Moon, Jianying Zhou, JaeCheol Ha
      Pages 267-281
  8. Session 7: Access Control and Trust Negotiation

    1. Charles C. Zhang, Marianne Winslett
      Pages 282-299
    2. Qihua Wang, Ninghui Li, Hong Chen
      Pages 317-332
  9. Session 8: Information Flow and Non-transferability

    1. Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands
      Pages 333-348
    2. Rinku Dewri, Indrakshi Ray, Indrajit Ray, Darrell Whitley
      Pages 349-363
    3. Carlo Blundo, Giuseppe Persiano, Ahmad-Reza Sadeghi, Ivan Visconti
      Pages 364-378
  10. Session 9: Secure Electronic Voting and Web Applications Security

    1. David Lundin, Peter Y. A. Ryan
      Pages 379-395
    2. Carlo Blundo, Emiliano De Cristofaro, Aniello Del Sorbo, Clemente Galdi, Giuseppe Persiano
      Pages 396-410
    3. Jennifer Sobey, Robert Biddle, P. C. van Oorschot, Andrew S. Patrick
      Pages 411-427
    4. Claudia Diaz, Carmela Troncoso, Bart Preneel
      Pages 428-445
  11. Session 10: VoIP Security, Malware, and DRM

    1. Yannis Soupionis, Stelios Dritsas, Dimitris Gritzalis
      Pages 446-460
    2. Carlton R. Davis, Stephen Neville, José M. Fernandez, Jean-Marc Robert, John McHugh
      Pages 461-480
    3. Monirul Sharif, Vinod Yegneswaran, Hassen Saidi, Phillip Porras, Wenke Lee
      Pages 481-500
    4. Joan Tomàs-Buliart, Marcel Fernández, Miguel Soriano
      Pages 501-516
  12. Session 11: Formal Models and Cryptographic Protocols

    1. Jay McCarthy, Shriram Krishnamurthi
      Pages 533-547
    2. Santiago Escobar, Catherine Meadows, José Meseguer
      Pages 548-562
  13. Session 12: Language-Based and Hardware Security

    1. Sergio Maffeis, Martín Abadi, Cédric Fournet, Andrew D. Gordon
      Pages 563-579
  14. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, held in Torremolinos, Spain, in October 2008.

The 37 revised full papers presented were carefully reviewed and selected from 168 submissions. The papers are organized in topical sections on Intrusion Detection and Network Vulnerability Analysis; Network Security; Smart Cards and Identity management; Data and Applications Security; Privacy Enhancing Technologies; Anonymity and RFID Privacy; Access Control and Trust Negotiation; Information Flow and Non-transferability; Secure Electronic Voting and Web Applications Security; VoIP Security, Malware, and DRM; Formal Models and Cryptographic Protocols; Language-based and Hardware Security.

Keywords

anonymity authorization cluster critical attack firewall identity identity management integrity check kerberos peer-to-peer privacy protocol analyzer risk management security trust

Editors and affiliations

  • Sushil Jajodia
    • 1
  • Javier Lopez
    • 2
  1. 1.Center for Secure Information SystemsGeorge Mason UniversityFairfaxUSA
  2. 2.Department of Computer ScienceUniversity of MalagaMálagaSpain

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-88313-5
  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-88312-8
  • Online ISBN 978-3-540-88313-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site