default search action
12th ESORICS 2007: Dresden, Germany
- Joachim Biskup, Javier López:
Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings. Lecture Notes in Computer Science 4734, Springer 2007, ISBN 978-3-540-74834-2
Invited Lecture
- Michael K. Reiter:
Trustworthy Services and the Biological Analogy. 1
Security Architecture and Secure Components I
- Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld:
Security of Multithreaded Programs by Compilation. 2-18 - Lujo Bauer, Scott Garriss, Michael K. Reiter:
Efficient Proving for Practical Distributed Access-Control Systems. 19-37 - Paul Z. Kolano:
Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control. 38-54
Access Control I
- Bo Luo, Dongwon Lee, Peng Liu:
Pragmatic XML Access Control Using Off-the-Shelf RDBMS. 55-71 - Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo:
Conditional Privacy-Aware Role Based Access Control. 72-89 - Qihua Wang, Ninghui Li:
Satisfiability and Resiliency in Workflow Systems. 90-105
Applied Cryptography I
- Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer:
Completeness of the Authentication Tests. 106-121 - Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra:
SilentKnock: Practical, Provably Undetectable Authentication. 122-138 - Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalized Key Delegation for Hierarchical Identity-Based Encryption. 139-154
Security Management and Secure Electronic Activities
- Alex X. Liu:
Change-Impact Analysis of Firewall Policies. 155-170 - Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati:
Fragmentation and Encryption to Enforce Privacy in Data Storage. 171-186 - Roberto Di Pietro, Refik Molva:
Information Confinement, Privacy, and Security in RFID Systems. 187-202
Formal Methods in Security I
- Moritz Y. Becker, Sebastian Nanz:
A Logic for State-Modifying Authorization Policies. 203-218 - Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell:
Inductive Proofs of Computational Secrecy. 219-234 - Ron van der Meyden:
What, Indeed, Is Intransitive Noninterference? 235-250
Information Control and Access Control
- Frederic Montagut, Refik Molva:
Traceability and Integrity of Execution in Distributed Workflow Management Systems. 251-266 - Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi:
Dynamic Information Flow Control Architecture for Web Applications. 267-282 - Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang:
Cloak: A Ten-Fold Way for Reliable Covert Communications. 283-298
Applied Cryptography II
- Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu:
Efficient Password-Based Authenticated Key Exchange Without Public Information. 299-310 - Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides:
Improved Anonymous Timed-Release Encryption. 311-326 - Sergei Evdokimov, Oliver Günther:
Encryption Techniques for Secure Database Outsourcing. 327-342
Access Control II
- Krzysztof Golofit:
Click Passwords Under Investigation. 343-358 - Sonia Chiasson, Paul C. van Oorschot, Robert Biddle:
Graphical Password Authentication Using Cued Click Points. 359-374 - Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi:
Obligations and Their Interaction with Programs. 375-389
Applied Cryptography III
- Aldar C.-F. Chan, Claude Castelluccia:
On the Privacy of Concealed Data Aggregation. 390-405 - Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu:
Synthesizing Secure Protocols. 406-421 - Véronique Cortier, Ralf Küsters, Bogdan Warinschi:
A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols. 422-437
Security Architecture and Secure Components II
- Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga:
Security Evaluation of Scenarios Based on the TCG's TPM Specification. 438-453 - Kerstin Lemke-Rust, Christof Paar:
Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods. 454-468 - André Adelsbach, Ulrich Greveler:
Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links. 469-484
Security Management
- Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya:
Towards Modeling Trust Based Decisions: A Game Theoretic Approach. 485-500 - Gabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio Fernandez Gómez-Skarmeta:
Extending the Common Services of eduGAIN with a Credential Conversion Service. 501-514 - Mikhail J. Atallah, Marina Blanton, Keith B. Frikken:
Incorporating Temporal Capabilities in Existing Key Management Schemes. 515-530
Secure Electronic Activities
- Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter:
A Policy Language for Distributed Usage Control. 531-546 - Nayantara Mallesh, Matthew K. Wright:
Countering Statistical Disclosure with Receiver-Bound Cover Traffic. 547-562 - Hongxia Jin, Jeffery Lotspiech:
Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack. 563-577
Formal Methods in Security III
- Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira:
Modular Access Control Via Strategic Rewriting. 578-593 - Juan Carlos López Pimentel, Raúl Monroy, Dieter Hutter:
On the Automated Correction of Security Protocols Susceptible to a Replay Attack. 594-609 - Steve Kremer, Laurent Mazaré:
Adaptive Soundness of Static Equivalence. 610-625
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.