Coverart for item
The Resource Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)

Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)

Label
Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings
Title
Computer security-- ESORICS 2005
Title remainder
10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings
Statement of responsibility
Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
Title variation
  • ESORICS 2005
  • 10th European Symposium on Research in Computer Security
  • Tenth European Symposium on Research in Computer Security
  • European Symposium on Research in Computer Security
Creator
Contributor
Subject
Genre
Language
eng
Summary
"These proceedings contain the papers selected for presentation at the 10th European Symposium on Research in Computer Security (ESORICS), held September 12-14, 2005 in Milan, Italy."
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
Language note
English
LC call number
QA76.9.A25
LC item number
E98 2005
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2005
http://bibfra.me/vocab/lite/meetingName
European Symposium on Research in Computer Security
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • De Capitani di Vimercati, Sabrina
  • Syverson, Paul F
  • Gollmann, Dieter
Series statement
Lecture notes in computer science,
Series volume
3679
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Informatique
  • Computer security
  • Computers
  • Sécurité informatique
  • Contrôle d'accès
  • Ordinateur
Label
Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols
Control code
262681007
Dimensions
unknown
Extent
1 online resource (xi, 508 pages)
Form of item
online
Isbn
9783540289630
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786611405618
  • 10.1007/11555827
  • 9783540289630
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-28963-0
Specific material designation
remote
System control number
(OCoLC)262681007
Label
Computer security-- ESORICS 2005 : 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005 : proceedings, Sabrina De Capitani di Vimercati, Paul Syverson, Dieter Gollmann (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Computerized Voting Machines: A View from the Trenches -- XML Access Control with Policy Matching Tree -- Semantic Access Control Model: A Formal Specification -- A Generic XACML Based Declarative Authorization Scheme for Java -- Specification and Validation of Authorisation Constraints Using UML and OCL -- Unified Index for Mobile Object Data and Authorizations -- On Obligations -- A Practical Voter-Verifiable Election Scheme -- Machine-Checked Security Proofs of Cryptographic Signature Schemes -- Sanitizable Signatures -- Limits of the Cryptographic Realization of Dolev-Yao-Style XOR -- Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study -- Augmented Oblivious Polynomial Evaluation Protocol and Its Applications -- Using Attack Trees to Identify Malicious Attacks from Authorized Insiders -- An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts -- Towards a Theory of Intrusion Detection -- On Scalability and Modularisation in the Modelling of Network Security Systems -- Sybil-Resistant DHT Routing -- Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks -- Quantifying Probabilistic Information Flow in Computational Reactive Systems -- Enforcing Non-safety Security Policies with Program Monitors -- Soundness of Formal Encryption in the Presence of Key-Cycles -- Privacy Preserving Clustering -- Abstractions Preserving Parameter Confidentiality -- Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation -- Security Notions for Disk Encryption -- Local View Attack on Anonymous Communication -- Browser Model for Security Analysis of Browser-Based Protocols
Control code
262681007
Dimensions
unknown
Extent
1 online resource (xi, 508 pages)
Form of item
online
Isbn
9783540289630
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
  • 9786611405618
  • 10.1007/11555827
  • 9783540289630
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-28963-0
Specific material designation
remote
System control number
(OCoLC)262681007

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...