Advertisement

Advances in Computer Science – ASIAN 2007. Computer and Network Security

12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007. Proceedings

  • Editors
  • Iliano Cervesato
Conference proceedings ASIAN 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4846)

Table of contents

  1. Front Matter
  2. Invited Speaker: Andrei Sabelfeld

    1. Session 1: Program Security

      1. Seokwoo Choi, Heewan Park, Hyun-il Lim, Taisook Han
        Pages 2-16
      2. Takahiro Kosakai, Toshiyuki Maeda, Akinori Yonezawa
        Pages 17-32
      3. Gurvan Le Guernic
        Pages 33-47
    2. Session 2: Short Papers on Computer Security

      1. Gavin O’Gorman, Stephen Blott
        Pages 48-54
      2. Junji Nakazato, Lihua Wang, Akihiro Yamamura
        Pages 55-61
      3. Sriperumbuduru Kandala Simhalu, Keiji Takeda
        Pages 62-69
      4. Mohammad Torabi Dashti, Yanjing Wang
        Pages 70-77
      5. Hyoungshick Kim
        Pages 78-85
      6. Gergei Bana, Koji Hasebe, Mitsuhiro Okada
        Pages 86-94
    3. Session 3: Access Control

      1. Samiha Ayed, Nora Cuppens-Boulahia, Frédéric Cuppens
        Pages 111-125
  3. Invited Speaker: Joshua Guttman

    1. Joshua D. Guttman
      Pages 142-149
    2. Session 4: Protocols

      1. Han Gao, Chiara Bodei, Pierpaolo Degano, Hanne Riis Nielson
        Pages 150-165
  4. Invited Speaker: Kazuhiko Kato

    1. Session 5: Intrusion Detection

      1. Elie Bursztein, Jean Goubault-Larrecq
        Pages 212-227
      2. Wilson Naik Bhukya, Suneel Kumar Kommuru, Atul Negi
        Pages 228-239
    2. Session 6: Short Papers on Network Security

      1. Atsushi Sakurai, Takashi Minohara, Ryota Sato, Keisuke Mizutani
        Pages 240-246
      2. Jungsuk Song, Hayato Ohba, Hiroki Takakura, Yasuo Okabe, Kenji Ohira, Yongjin Kwon
        Pages 247-253
      3. Petros Belsis, Stefanos Gritzalis, Christos Skourlas, Vassilis Tsoukalas
        Pages 261-267
    3. Session 7: Safe Execution

      1. Harshit Shah, R. K. Shyamasundar
        Pages 268-281
      2. Michele Bugliesi, Damiano Macedonio, Sabina Rossi
        Pages 282-296
      3. Tomohiro Shioya, Yoshihiro Oyama, Hideya Iwasaki
        Pages 297-311
  5. Back Matter

About these proceedings

Keywords

IPv6 Information Linux access control anonymity authentication bilinear pairings biometric verification classification formal methods modeling programming security semantics verification

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-76929-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-76927-9
  • Online ISBN 978-3-540-76929-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site