Books+ Search Results

Advances in Computer Science - ASIAN 2007. Computer and Network Security 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings

Title
Advances in Computer Science - ASIAN 2007. Computer and Network Security [electronic resource] : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings / edited by Iliano Cervesato.
ISBN
9783540769293
Edition
1st ed. 2007.
Publication
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Physical Description
1 online resource (XI, 316 p.)
Local Notes
Access is available to the Yale community.
Access and use
Access restricted by licensing agreement.
Variant and related titles
Springer ENIN.
Other formats
Printed edition:
Printed edition:
Format
Books / Online
Language
English
Added to Catalog
May 09, 2023
Series
Theoretical Computer Science and General Issues, 4846
Theoretical Computer Science and General Issues, 4846
Contents
Invited Speaker: Andrei Sabelfeld
Dimensions of Declassification in Theory and Practice
A Static Birthmark of Binary Executables Based on API Call Structure
Compiling C Programs into a Strongly Typed Assembly Language
Information Flow Testing
Large Scale Simulation of Tor:
Privacy Enhancing Credentials
Browser Based Agile E-Voting System
Risk Balance in Exchange Protocols
Scalable DRM System for Media Portability
Computational Semantics for Basic Protocol Logic - A Stochastic Approach
Management Advantages of Object Classification in Role-Based Access Control (RBAC)
An Integrated Model for Access Control and Information Flow Requirements
Digital Rights Management Using a Master Control Device
Invited Speaker: Joshua Guttman
How to do Things with Cryptographic Protocols
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming
Secure Verification of Location Claims with Simultaneous Distance Modification
Invited Speaker: Kazuhiko Kato
Modeling and Virtualization for Secure Computing Environments
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks
Masquerade Detection Based Upon GUI User Profiling in Linux Systems
One-Time Receiver Address in IPv6 for Protecting Unlinkability
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts
Combining Heterogeneous Classifiers for Network Intrusion Detection
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments
On Run-Time Enforcement of Policies
Static vs Dynamic Typing for Access Control in Pi-Calculus
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.
Also listed under
Cervesato, Iliano. editor.
SpringerLink (Online service)
Citation

Available from:

Online
Loading holdings.
Unable to load. Retry?
Loading holdings...
Unable to load. Retry?