ESORICS A

29 papers

YearTitle / Authors
2005A Generic XACML Based Declarative Authorization Scheme for Java.
Rajeev Gupta, Manish Bhide
2005A Practical Voter-Verifiable Election Scheme.
David Chaum, Peter Y. A. Ryan, Steve A. Schneider
2005Abstractions Preserving Parameter Confidentiality.
Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph
2005An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts.
Lingyu Wang, Anyi Liu, Sushil Jajodia
2005Augmented Oblivious Polynomial Evaluation Protocol and Its Applications.
Huafei Zhu, Feng Bao
2005Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks.
Felix C. Freiling, Thorsten Holz, Georg Wicherski
2005Browser Model for Security Analysis of Browser-Based Protocols.
Thomas Groß, Birgit Pfitzmann, Ahmad-Reza Sadeghi
2005Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings
Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann
2005Computerized Voting Machines: A View from the Trenches.
Barbara Simons
2005Enforcing Non-safety Security Policies with Program Monitors.
Jay Ligatti, Lujo Bauer, David Walker
2005Limits of the Cryptographic Realization of Dolev-Yao-Style XOR.
Michael Backes, Birgit Pfitzmann
2005Local View Attack on Anonymous Communication.
Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski
2005Machine-Checked Security Proofs of Cryptographic Signature Schemes.
Sabrina Tarento
2005Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation.
Fabio Massacci, John Mylopoulos, Nicola Zannone
2005On Obligations.
Manuel Hilty, David A. Basin, Alexander Pretschner
2005On Scalability and Modularisation in the Modelling of Network Security Systems.
João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus
2005Privacy Preserving Clustering.
Somesh Jha, Louis Kruger, Patrick D. McDaniel
2005Quantifying Probabilistic Information Flow in Computational Reactive Systems.
Michael Backes
2005Sanitizable Signatures.
Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik
2005Security Notions for Disk Encryption.
Kristian Gjøsteen
2005Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study.
Aslan Askarov, Andrei Sabelfeld
2005Semantic Access Control Model: A Formal Specification.
Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana
2005Soundness of Formal Encryption in the Presence of Key-Cycles.
Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov
2005Specification and Validation of Authorisation Constraints Using UML and OCL.
Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge
2005Sybil-Resistant DHT Routing.
George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson
2005Towards a Theory of Intrusion Detection.
Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade
2005Unified Index for Mobile Object Data and Authorizations.
Vijayalakshmi Atluri, Qi Guo
2005Using Attack Trees to Identify Malicious Attacks from Authorized Insiders.
Indrajit Ray, Nayot Poolsapassit
2005XML Access Control with Policy Matching Tree.
Naizhen Qi, Michiharu Kudo