Cantitate/Preț
Produs

Computer Security - ESORICS 2004: 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings: Lecture Notes in Computer Science, cartea 3193

Editat de Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
en Limba Engleză Paperback – 6 sep 2004

Din seria Lecture Notes in Computer Science

Preț: 39815 lei

Nou

Puncte Express: 597

Preț estimativ în valută:
7621 7926$ 6386£

Carte tipărită la comandă

Livrare economică 13-27 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540229872
ISBN-10: 3540229876
Pagini: 472
Ilustrații: X, 457 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.65 kg
Ediția:2004
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Incorporating Dynamic Constraints in the Flexible Authorization Framework.- Access-Condition-Table-Driven Access Control for XML Databases.- An Algebra for Composing Enterprise Privacy Policies.- Deriving, Attacking and Defending the GDOI Protocol.- Better Privacy for Trusted Computing Platforms.- A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol.- A Formalization of Anonymity and Onion Routing.- Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics.- Comparison Between Two Practical Mix Designs.- Signature Bouquets: Immutability for Aggregated/Condensed Signatures.- Towards a Theory of Data Entanglement.- Portable and Flexible Document Access Control Mechanisms.- Possibilistic Information Flow Control in the Presence of Encrypted Communication.- Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage.- Security Property Based Administrative Controls.- A Vector Model of Trust for Developing Trustworthy Systems.- Parameterized Authentication.- Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks.- Hindering Eavesdropping via IPv6 Opportunistic Encryption.- On the Role of Key Schedules in Attacks on Iterated Ciphers.- A Public-Key Encryption Scheme with Pseudo-random Ciphertexts.- A Host Intrusion Prevention System for Windows Operating Systems.- Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table.- ARCHERR: Runtime Environment Driven Program Safety.- Sets, Bags, and Rock and Roll.- Redundancy and Diversity in Security.- Discovering Novel Attack Strategies from INFOSEC Alerts.