Computer Security - ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings

Author:   Einar Snekkenes ,  Dieter Gollmann
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2003 ed.
Volume:   2808
ISBN:  

9783540203001


Pages:   350
Publication Date:   29 September 2003
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $168.96 Quantity:  
Add to Cart

Share |

Computer Security - ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings


Add your own review!

Overview

This book constitutes the refereed proceedings of the 8th European Symposium on Research in Computer Security, ESORICS 2003, held in Gjovik, Norway in October 2003.The 19 revised full papers presented were carefully reviewed and selected from 114 submissions. Among the topics addressed are signature control, access control, key exchange, broadcast protocols, privacy preserving technologies, attack analysis, electronic voting, identity control, authentication, security services, smart card security, formal security protocols analysis, and intrusion detection.

Full Product Details

Author:   Einar Snekkenes ,  Dieter Gollmann
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2003 ed.
Volume:   2808
Dimensions:   Width: 15.50cm , Height: 1.80cm , Length: 23.50cm
Weight:   1.120kg
ISBN:  

9783540203001


ISBN 10:   3540203001
Pages:   350
Publication Date:   29 September 2003
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Signature and Access Control Policies for XML Documents.- Authorization and Access Control in Adaptive Workflows.- Flexible Regulation of Distributed Coalitions.- Initiator-Resilient Universally Composable Key Exchange.- Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing.- Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.- Passive Attack Analysis for Connection-Based Anonymity Systems.- Rapid Mixing and Security of Chaum's Visual Electronic Voting.- Towards Accountable Management of Privacy and Identity Information.- A Toolkit for Managing Enterprise Privacy Policies.- Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.- Hardware Encapsulation of Security Services.- A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management.- Bridging Model-Based and Language-Based Security.- An On-the-Fly Model-Checker for Security Protocol Analysis.- Symmetric Authentication within a Simulatable Cryptographic Library.- An Improved Reference Flow Control Model for Policy-Based Intrusion Detection.- Visualisation for Intrusion Detection.- On the Detection of Anomalous System Call Arguments.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List