Advertisement

Computer Security – ESORICS 2009

14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009. Proceedings

  • Michael Backes
  • Peng Ning

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5789)

Table of contents

  1. Front Matter
  2. Network Security I

    1. Thorsten Holz, Markus Engelberth, Felix Freiling
      Pages 1-18
    2. Daisuke Mashima, Mustaque Ahamad, Swagath Kannan
      Pages 19-36
    3. Ahren Studer, Adrian Perrig
      Pages 37-52
    4. Information Flow

      1. Matteo Centenaro, Riccardo Focardi, Flaminia L. Luccio, Graham Steel
        Pages 53-68
      2. Alexander Lux, Heiko Mantel
        Pages 69-85
      3. Alejandro Russo, Andrei Sabelfeld, Andrey Chudnov
        Pages 86-103
  3. Network Security II

    1. Yossi Gilad, Amir Herzberg
      Pages 104-119
    2. Yali Liu, Dipak Ghosal, Frederik Armknecht, Ahmad-Reza Sadeghi, Steffen Schulz, Stefan Katzenbeisser
      Pages 120-135
    3. Alina Oprea, Kevin D. Bowers
      Pages 136-151
    4. Language Based Security

      1. Radha Jagadeesan, Alan Jeffrey, Corin Pitcher, James Riely
        Pages 152-167
      2. Nataliya Guts, Cédric Fournet, Francesco Zappa Nardelli
        Pages 168-183
      3. Avik Chaudhuri, Deepak Garg
        Pages 184-199
  4. Network Security III

    1. Zhi Wang, Xuxian Jiang, Weidong Cui, Xinyuan Wang, Mike Grace
      Pages 200-215
    2. Drew Davidson, Randy Smith, Nic Doyle, Somesh Jha
      Pages 216-231
    3. Peter Wurzinger, Leyla Bilge, Thorsten Holz, Jan Goebel, Christopher Kruegel, Engin Kirda
      Pages 232-249
    4. Access Control

      1. David Basin, Samuel J. Burri, Günter Karjoth
        Pages 250-267
      2. Joachim Biskup, Christian Gogolin, Jens Seiler, Torben Weibert
        Pages 285-302
    5. Privacy - I

      1. Philip W. L. Fong, Mohd Anwar, Zhen Zhao
        Pages 303-320
      2. Ching Yu Ng, Willy Susilo, Yi Mu, Rei Safavi-Naini
        Pages 321-336
      3. Sebastian Mödersheim, Luca Viganò
        Pages 337-354
    6. Distributed Systems Security

      1. Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
        Pages 355-370
      2. Sipat Triukose, Zakaria Al-Qudah, Michael Rabinovich
        Pages 371-389
      3. Ravinder Shankesi, Musab AlTurki, Ralf Sasse, Carl A. Gunter, José Meseguer
        Pages 390-405
    7. Privacy - II

      1. George Danezis, Claudia Diaz, Emilia Käsper, Carmela Troncoso
        Pages 406-423
      2. Mauro Barni, Pierluigi Failla, Vladimir Kolesnikov, Riccardo Lazzeretti, Ahmad-Reza Sadeghi, Thomas Schneider
        Pages 424-439
      3. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
        Pages 440-455
    8. Security Primitives

      1. Darrell Bethea, Michael K. Reiter
        Pages 456-471
      2. Giovanni Di Crescenzo, Shaoquan Jiang, Reihaneh Safavi-Naini
        Pages 489-504
    9. Web Security

      1. Sergio Maffeis, John C. Mitchell, Ankur Taly
        Pages 505-522
      2. Yanlin Peng, Linfeng Zhang, J. Morris Chang, Yong Guan
        Pages 523-538
      3. Fangqi Sun, Liang Xu, Zhendong Su
        Pages 539-554
    10. Cryptography

      1. Cristian Ene, Yassine Lakhnech, Van Chan Ngo
        Pages 555-570
      2. Mihhail Aizatulin, Henning Schnoor, Thomas Wilke
        Pages 571-586
      3. Rakesh Bobba, Himanshu Khurana, Manoj Prabhakaran
        Pages 587-604
    11. Protocols

      1. Nils Ole Tippenhauer, Srdjan Čapkun
        Pages 621-636
      2. Ton van Deursen, Sjouke Mauw, Saša Radomirović, Pim Vullers
        Pages 637-654
    12. Systems Security and Forensics

      1. Michael LeMay, Carl A. Gunter
        Pages 655-670
      2. Liang Chen, Jason Crampton
        Pages 689-704
  5. Back Matter

About these proceedings

Introduction

This book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009.

The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.

Keywords

access control authorization cloud computing computer security encryption firewall manet model checking network filtering packet inspection security social networks

Editors and affiliations

  • Michael Backes
    • 1
  • Peng Ning
    • 2
  1. 1.Computer Science Department and MPI-SWSSaarland UniversitySaarbrückenGermany
  2. 2.Department of Computer ScienceNorth Carolina State UniversityRaleighUSA

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04444-1
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-04443-4
  • Online ISBN 978-3-642-04444-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site