Computer Security – ESORICS 2007

12th European Symposium On Research In Computer Security, Dresden, Germany, September 24 — 26, 2007. Proceedings

  • Editors
  • Joachim Biskup
  • Javier López
Conference proceedings ESORICS 2007

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4734)

Table of contents

  1. Front Matter
  2. Invited Lecture

  3. Security Architecture and Secure Components I

    1. Gilles Barthe, Tamara Rezk, Alejandro Russo, Andrei Sabelfeld
      Pages 2-18
    2. Lujo Bauer, Scott Garriss, Michael K. Reiter
      Pages 19-37
  4. Access Control I

    1. Bo Luo, Dongwon Lee, Peng Liu
      Pages 55-71
    2. Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo
      Pages 72-89
    3. Qihua Wang, Ninghui Li
      Pages 90-105
  5. Applied Cryptography I

    1. Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Thayer
      Pages 106-121
    2. Eugene Y. Vasserman, Nicholas Hopper, John Laxson, James Tyra
      Pages 122-138
    3. Michel Abdalla, Eike Kiltz, Gregory Neven
      Pages 139-154
    4. Security Management and Secure Electronic Activities

      1. Valentina Ciriani, Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Stefano Paraboschi, Pierangela Samarati
        Pages 171-186
      2. Roberto Di Pietro, Refik Molva
        Pages 187-202
  6. Formal Methods in Security I

    1. Moritz Y. Becker, Sebastian Nanz
      Pages 203-218
    2. Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell
      Pages 219-234
    3. Ron van der Meyden
      Pages 235-250
    4. Information Control and Access Control

      1. Sachiko Yoshihama, Takeo Yoshizawa, Yuji Watanabe, Michiharu Kudoh, Kazuko Oyanagi
        Pages 267-282
      2. Xiapu Luo, Edmond W. W. Chan, Rocky K. C. Chang
        Pages 283-298
  7. Applied Cryptography II

    1. Jun Shao, Zhenfu Cao, Licheng Wang, Rongxing Lu
      Pages 299-310
    2. Konstantinos Chalkias, Dimitrios Hristu-Varsakelis, George Stephanides
      Pages 311-326
    3. Sergei Evdokimov, Oliver Günther
      Pages 327-342
  8. Access Control II

    1. Krzysztof Gołofit
      Pages 343-358
    2. Sonia Chiasson, P. C. van Oorschot, Robert Biddle
      Pages 359-374
    3. Daniel J. Dougherty, Kathi Fisler, Shriram Krishnamurthi
      Pages 375-389
  9. Applied Cryptography III

    1. Aldar C. -F. Chan, Claude Castelluccia
      Pages 390-405
    2. Véronique Cortier, Bogdan Warinschi, Eugen Zălinescu
      Pages 406-421
  10. Security Architecture and Secure Components II

    1. Sigrid Gürgens, Carsten Rudolph, Dirk Scheuermann, Marion Atts, Rainer Plaga
      Pages 438-453
    2. André Adelsbach, Ulrich Greveler
      Pages 469-484
    3. Security Management

      1. Vidyaraman Sankaranarayanan, Madhusudhanan Chandrasekaran, Shambhu Upadhyaya
        Pages 485-500
      2. Gabriel López, Óscar Cánovas, Diego R. Lopez, Antonio F. Gómez-Skarmeta
        Pages 501-514
      3. Mikhail J. Atallah, Marina Blanton, Keith B. Frikken
        Pages 515-530
    4. Secure Electronic Activities

      1. M. Hilty, A. Pretschner, D. Basin, C. Schaefer, T. Walter
        Pages 531-546
      2. Nayantara Mallesh, Matthew Wright
        Pages 547-562
  11. Formal Methods in Security III

    1. Daniel J. Dougherty, Claude Kirchner, Hélène Kirchner, Anderson Santana de Oliveira
      Pages 578-593
    2. Juan C. Lopez P., Raúl Monroy, Dieter Hutter
      Pages 594-609
    3. Steve Kremer, Laurent Mazaré
      Pages 610-625
  12. Back Matter

About these proceedings


DBMS Workflow Management authorization schemes communication computer security cryptography data security denial-of-service attacks digital signatures electronic voting identity intrusion detection network security secure communications security

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science Computer Science (R0)
  • Print ISBN 978-3-540-74834-2
  • Online ISBN 978-3-540-74835-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software