000 05806nam a22006855i 4500
001 978-3-642-04444-1
003 DE-He213
005 20240730202059.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642044441
_9978-3-642-04444-1
024 7 _a10.1007/978-3-642-04444-1
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aComputer Security -- ESORICS 2009
_h[electronic resource] :
_b14th European Symposium on Research in Computer Security, Saint-Malo, France, September 21-23, 2009, Proceedings /
_cedited by Michael Backes, Peng Ning.
250 _a1st ed. 2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2009.
300 _aXVI, 706 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5789
505 0 _aNetwork Security I -- Learning More about the Underground Economy: A Case-Study of Keyloggers and Dropzones -- User-Centric Handling of Identity Agent Compromise -- The Coremelt Attack -- Type-Based Analysis of PIN Processing APIs -- Declassification with Explicit Reference Points -- Tracking Information Flow in Dynamic Tree Structures -- Network Security II -- Lightweight Opportunistic Tunneling (LOT) -- Hide and Seek in Time - Robust Covert Timing Channels -- Authentic Time-Stamps for Archival Storage -- Towards a Theory of Accountability and Audit -- Reliable Evidence: Auditability by Typing -- PCAL: Language Support for Proof-Carrying Authorization Systems -- Network Security III -- ReFormat: Automatic Reverse Engineering of Encrypted Messages -- Protocol Normalization Using Attribute Grammars -- Automatically Generating Models for Botnet Detection -- Dynamic Enforcement of Abstract Separation of Duty Constraints -- Usable Access Control in Collaborative Environments: Authorization Based on People-Tagging -- Requirements and Protocols for Inference-Proof Interactions in Information Systems -- A Privacy Preservation Model for Facebook-Style Social Network Systems -- New Privacy Results on Synchronized RFID Authentication Protocols against Tag Tracing -- Secure Pseudonymous Channels -- Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing -- Content Delivery Networks: Protection or Threat? -- Model-Checking DoS Amplification for VoIP Session Initiation -- The Wisdom of Crowds: Attacks and Optimal Constructions -- Secure Evaluation of Private Linear Branching Programs with Medical Applications -- Keep a Few: Outsourcing Data While Maintaining Confidentiality -- Data Structures with Unpredictable Timing -- WORM-SEAL: Trustworthy Data Retention and Verification for Regulatory Compliance -- Corruption-Localizing Hashing -- Isolating JavaScript with Filters, Rewriting, and Wrappers -- An Effective Method for Combating Malicious Scripts Clickbots -- Client-Side Detectionof XSS Worms by Monitoring Payload Propagation -- Formal Indistinguishability Extended to the Random Oracle Model -- Computationally Sound Analysis of a Probabilistic Contract Signing Protocol -- Attribute-Sets: A Practically Motivated Enhancement to Attribute-Based Encryption -- A Generic Security API for Symmetric Key Management on Cryptographic Devices -- ID-Based Secure Distance Bounding and Localization -- Secure Ownership and Ownership Transfer in RFID Systems -- Cumulative Attestation Kernels for Embedded Systems -- Super-Efficient Aggregating History-Independent Persistent Authenticated Dictionaries -- Set Covering Problems in Role-Based Access Control.
520 _aThis book constitutes the proceedings of the 14th European Symposium on Research in Computer Security, ESORICS 2009, held in Saint-Malo, France, in September 2009. The 42 papers included in the book were carefully reviewed and selected from 220 papers. The topics covered are network security, information flow, language based security, access control, privacy, distributed systems security, security primitives, web security, cryptography, protocols, and systems security and forensics.
650 0 _aData protection.
_97245
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aCoding theory.
_94154
650 0 _aInformation theory.
_914256
650 0 _aData structures (Computer science).
_98188
650 0 _aComputer science
_xMathematics.
_93866
650 0 _aDiscrete mathematics.
_912873
650 0 _aElectronic commerce.
_95589
650 1 4 _aData and Information Security.
_931990
650 2 4 _aCryptology.
_931769
650 2 4 _aCoding and Information Theory.
_9169976
650 2 4 _aData Structures and Information Theory.
_931923
650 2 4 _aDiscrete Mathematics in Computer Science.
_931837
650 2 4 _ae-Commerce and e-Business.
_931772
700 1 _aBackes, Michael.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9169977
700 1 _aNing, Peng.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9169978
710 2 _aSpringerLink (Online service)
_9169979
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642044434
776 0 8 _iPrinted edition:
_z9783642044458
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5789
_9169980
856 4 0 _uhttps://doi.org/10.1007/978-3-642-04444-1
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c96857
_d96857