Skip to main content
  • Conference proceedings
  • © 2007

Computer Security - ESORICS 2007

12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 - 26, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4734)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2007.

Buying options

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (40 papers)

  1. Front Matter

  2. Invited Lecture

  3. Security Architecture and Secure Components I

    1. Security of Multithreaded Programs by Compilation

      • Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld
      Pages 2-18
    2. Efficient Proving for Practical Distributed Access-Control Systems

      • Lujo Bauer, Scott Garriss, Michael K. Reiter
      Pages 19-37
  4. Access Control I

    1. Pragmatic XML Access Control Using Off-the-Shelf RDBMS

      • Bo Luo, Dongwon Lee, Peng Liu
      Pages 55-71
    2. Conditional Privacy-Aware Role Based Access Control

      • Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
      Pages 72-89
    3. Satisfiability and Resiliency in Workflow Systems

      • Qihua Wang, Ninghui Li
      Pages 90-105
  5. Applied Cryptography I

    1. Completeness of the Authentication Tests

      • Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
      Pages 106-121
    2. SilentKnock: Practical, Provably Undetectable Authentication

      • Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra
      Pages 122-138
    3. Generalized Key Delegation for Hierarchical Identity-Based Encryption

      • Michel Abdalla, Eike Kiltz, Gregory Neven
      Pages 139-154
    4. Security Management and Secure Electronic Activities

      1. Fragmentation and Encryption to Enforce Privacy in Data Storage
        • Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
        Pages 171-186
      2. Information Confinement, Privacy, and Security in RFID Systems
        • Roberto Di Pietro, Refik Molva
        Pages 187-202
  6. Formal Methods in Security I

    1. A Logic for State-Modifying Authorization Policies

      • Moritz Y. Becker, Sebastian Nanz
      Pages 203-218
    2. Inductive Proofs of Computational Secrecy

      • Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
      Pages 219-234
    3. What, Indeed, Is Intransitive Noninterference?

      • Ron van der Meyden
      Pages 235-250
    4. Information Control and Access Control

      1. Dynamic Information Flow Control Architecture for Web Applications
        • Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudoh, Kazuko Oyanagi
        Pages 267-282
      2. Cloak: A Ten-Fold Way for Reliable Covert Communications
        • Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
        Pages 283-298

Other Volumes

  1. Computer Security – ESORICS 2007

Keywords

  • DBMS
  • Workflow Management
  • authorization schemes
  • communication
  • computer security
  • cryptography
  • data security
  • denial-of-service attacks
  • digital signatures
  • electronic voting
  • identity
  • intrusion detection
  • network security
  • secure communications
  • security

Bibliographic Information

Buying options

eBook USD 84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions