ESORICS A

33 papers

YearTitle / Authors
2006A Formal Framework for Confidentiality-Preserving Refinement.
Thomas Santen
2006A Formal Model of Access Control for Mobile Interactive Devices.
Frédéric Besson, Guillaume Dufay, Thomas P. Jensen
2006A Linear Logic of Authorization and Knowledge.
Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter
2006Analysis of Policy Anomalies on Distributed Network Security Setups.
Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia
2006Applying a Security Requirements Engineering Process.
Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
2006Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks.
Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro
2006Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components.
Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
2006Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings
Dieter Gollmann, Jan Meier, Andrei Sabelfeld
2006Conditional Reactive Simulatability.
Michael Backes, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters
2006Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos.
Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay
2006Delegation in Role-Based Access Control.
Jason Crampton, Hemanth Khambhammettu
2006Deriving Secrecy in Key Establishment Protocols.
Dusko Pavlovic, Catherine Meadows
2006Discretionary Capability Confinement.
Philip W. L. Fong
2006Enhanced Security Architecture for Music Distribution on Mobile.
Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau
2006Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors.
Michael P. Collins, Michael K. Reiter
2006From Coupling Relations to Mated Invariants for Checking Information Flow.
David A. Naumann
2006HBAC: A Model for History-Based Access Control and Its Model Checking.
Jing Wang, Yoshiaki Takata, Hiroyuki Seki
2006Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems.
Mudhakar Srivatsa, Ling Liu
2006License Transfer in OMA-DRM.
Cheun Ngen Chong, Sorin M. Iacob, R. Paul Koster, Javier Montaner, René van Buuren
2006Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes.
Michael Backes, Birgit Pfitzmann, Michael Waidner
2006Minimal Threshold Closure.
Xibin Zhao, Kwok-Yan Lam, Guiming Luo, Siu Leung Chung, Ming Gu
2006Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System.
Alex Hai Wang, Peng Liu
2006Policy-Driven Memory Protection for Reconfigurable Hardware.
Ted Huffmire, Shreyas Prasad, Timothy Sherwood, Ryan Kastner
2006Privacy-Preserving Queries on Encrypted Data.
Zhiqiang Yang, Sheng Zhong, Rebecca N. Wright
2006Private Information Retrieval Using Trusted Hardware.
Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
2006Prêt à Voter with Re-encryption Mixes.
Peter Y. A. Ryan, Steve A. Schneider
2006Reducing the Dependence of SPKI/SDSI on PKI.
Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine
2006Secure Key-Updating for Lazy Revocation.
Michael Backes, Christian Cachin, Alina Oprea
2006SessionSafe: Implementing XSS Immune Session Handling.
Martin Johns
2006Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses.
Vitaly Shmatikov, Ming-Hsiu Wang
2006Timing-Sensitive Information Flow Analysis for Synchronous Systems.
Boris Köpf, David A. Basin
2006Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems.
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, Boris Skoric
2006TrustedPals: Secure Multiparty Computation Implemented with Smart Cards.
Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan