Computer Security – ESORICS 2009

14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

  • Michael Backes
  • Peng Ning
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5789)

Table of contents

  1. Front Matter
  2. Network Security I

    1. Thorsten Holz, Markus Engelberth, Felix Freiling
      Pages 1-18
    2. Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
      Pages 19-36
    3. Ahren Studer, Adrian Perrig
      Pages 37-52
    4. Information Flow

      1. Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel
        Pages 53-68
      2. Alexander Lux, Heiko Mantel
        Pages 69-85
      3. Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov
        Pages 86-103
  3. Network Security II

    1. Yossi Gilad, Amir Herzberg
      Pages 104-119
    2. Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
      Pages 120-135
    3. Alina Oprea, Kevin D. Bowers
      Pages 136-151
    4. Language Based Security

      1. Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely
        Pages 152-167
      2. Nataliya Guts, Cédric Fournet, Francesco Zappa Nardelli
        Pages 168-183
      3. Avik Chaudhuri, Deepak Garg
        Pages 184-199
  4. Network Security III

    1. Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace
      Pages 200-215
    2. Drew Davidson, Randy Smith, Nic Doyle, Somesh Jha
      Pages 216-231
    3. Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda
      Pages 232-249
    4. Access Control

      1. David Basin, Samuel J. Burri, Günter Karjoth
        Pages 250-267
      2. Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert
        Pages 285-302
    5. Privacy - I

      1. Philip W. L. Fong, Mohd Anwar, Zhen Zhao
        Pages 303-320

About these proceedings

Introduction

This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.

The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.

Keywords

access control authorization cloud computing computer security encryption firewall manet model checking network filtering packet inspection security social networks

Editors and affiliations

  • Michael Backes
    • 1
  • Peng Ning
    • 2
  1. 1.Computer Science Department and MPI-SWSSaarland UniversitySaarbrückenGermany
  2. 2.Department of Computer ScienceNorth Carolina State UniversityRaleighUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04444-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04443-4
  • Online ISBN 978-3-642-04444-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349