ESORICS A

41 papers

YearTitle / Authors
2007A Cryptographic Model for Branching Time Security Properties - The Case of Contract Signing Protocols.
Véronique Cortier, Ralf Küsters, Bogdan Warinschi
2007A Logic for State-Modifying Authorization Policies.
Moritz Y. Becker, Sebastian Nanz
2007A Policy Language for Distributed Usage Control.
Manuel Hilty, Alexander Pretschner, David A. Basin, Christian Schaefer, Thomas Walter
2007Adaptive Soundness of Static Equivalence.
Steve Kremer, Laurent Mazaré
2007Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods.
Kerstin Lemke-Rust, Christof Paar
2007Change-Impact Analysis of Firewall Policies.
Alex X. Liu
2007Click Passwords Under Investigation.
Krzysztof Golofit
2007Cloak: A Ten-Fold Way for Reliable Covert Communications.
Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
2007Completeness of the Authentication Tests.
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
2007Computer Security - ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings
Joachim Biskup, Javier López
2007Conditional Privacy-Aware Role Based Access Control.
Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
2007Countering Statistical Disclosure with Receiver-Bound Cover Traffic.
Nayantara Mallesh, Matthew K. Wright
2007Dynamic Information Flow Control Architecture for Web Applications.
Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudo, Kazuko Oyanagi
2007Efficient Password-Based Authenticated Key Exchange Without Public Information.
Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
2007Efficient Proving for Practical Distributed Access-Control Systems.
Lujo Bauer, Scott Garriss, Michael K. Reiter
2007Encryption Techniques for Secure Database Outsourcing.
Sergei Evdokimov, Oliver Günther
2007Extending the Common Services of eduGAIN with a Credential Conversion Service.
Gabriel López Millán, Óscar Cánovas Reverte, Diego R. López, Antonio Fernandez Gómez-Skarmeta
2007Fragmentation and Encryption to Enforce Privacy in Data Storage.
Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
2007Generalized Key Delegation for Hierarchical Identity-Based Encryption.
Michel Abdalla, Eike Kiltz, Gregory Neven
2007Graphical Password Authentication Using Cued Click Points.
Sonia Chiasson, Paul C. van Oorschot, Robert Biddle
2007Improved Anonymous Timed-Release Encryption.
Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides
2007Incorporating Temporal Capabilities in Existing Key Management Schemes.
Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
2007Inductive Proofs of Computational Secrecy.
Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
2007Information Confinement, Privacy, and Security in RFID Systems.
Roberto Di Pietro, Refik Molva
2007Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links.
André Adelsbach, Ulrich Greveler
2007Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control.
Paul Z. Kolano
2007Modular Access Control Via Strategic Rewriting.
Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira
2007Obligations and Their Interaction with Programs.
Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi
2007On the Automated Correction of Security Protocols Susceptible to a Replay Attack.
Juan Carlos López Pimentel, Raúl Monroy, Dieter Hutter
2007On the Privacy of Concealed Data Aggregation.
Aldar C.-F. Chan, Claude Castelluccia
2007Pragmatic XML Access Control Using Off-the-Shelf RDBMS.
Bo Luo, Dongwon Lee, Peng Liu
2007Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack.
Hongxia Jin, Jeffery Lotspiech
2007Satisfiability and Resiliency in Workflow Systems.
Qihua Wang, Ninghui Li
2007Security Evaluation of Scenarios Based on the TCG's TPM Specification.
Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga
2007Security of Multithreaded Programs by Compilation.
Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld
2007SilentKnock: Practical, Provably Undetectable Authentication.
Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra
2007Synthesizing Secure Protocols.
Véronique Cortier, Bogdan Warinschi, Eugen Zalinescu
2007Towards Modeling Trust Based Decisions: A Game Theoretic Approach.
Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu J. Upadhyaya
2007Traceability and Integrity of Execution in Distributed Workflow Management Systems.
Frederic Montagut, Refik Molva
2007Trustworthy Services and the Biological Analogy.
Michael K. Reiter
2007What, Indeed, Is Intransitive Noninterference?
Ron van der Meyden