close
1.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2002  viii, 331 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Information Flow I
Approximate Non-Interference / A. Di Pierro ; C. Hankin ; H. Wiklicky
Quantifying Information Flow / G. Lowe
Secrecy in Multiagent Systems / J. Halpern ; K. O'Neill
Intrusion
Two Formal Analyses of Attack Graphs / S. Jha ; O. Sheyner ; J. Wing
Formal Specification of Intrusion Signatures and Detection Rules / J.-P. Pouzol ; M. Ducasse
Protocols I
Types and Effects for Asymmetric Cryptographic Protocols / A. D. Gordon ; A. Jeffrey
Security Protocol Design via Authentication Tests / J. D. Guttman
Strand Spaces and Rank Functions: More Than Distant Cousins / J. Heather
Applications of Model-Checking
Probabilistic Analysis of Anonymity / V. Shmatikov
Analysis of SPKI/SDSI Certificates Using Model Checking / T. Reps
Protocols II
Capturing Parallel Attacks within the Data Independence Framework / P. J. Broadfoot ; A. W. Roscoe
Polynomial Fairness and Liveness / M. Backes ; B. Pfitzmann ; M. Steiner ; M. Waidner
A Formal Analysis of Some Properties of Kerberos 5 Using MSR / F. Butler ; I. Cervesato ; A. D. Jaggard ; A. Scedrov
Games
A Formal Analysis of Syverson's Rational Exchange Protocol / L. Buttyan ; J.-P. Hubaux ; S. Capkun
Game Analysis of Abuse-Free Contract Signing / S. Kremer ; J.-F. Raskin
Language-Based Security
Fine-Grained Information Flow Analysis for a [lambda]-Calculus with Sum Types / V. Simonet
Cryptographic Types / D. Duggan
Secure Information Flow and Pointer Confinement in a Java-Like Language / A. Banerjee ; D. A. Naumann
Distributed Rights, Access Control, and Watermarking
A Privacy Policy Model for Enterprises / G. Karjoth ; M. Schunter
A Logic for Reasoning about Digital Rights / R. Pucella ; V. Weissman
Hiding Functions and Computational Security of Image Watermarking Systems / N. Tran
Information Flow II
Information Flow Security in Dynamic Contexts / R. Focardi ; S. Rossi
A Simple View of Type-Secure Information Flow in the [pi]-Calculus / F. Pottier
Author Index
Preface
Workshop Committee
Information Flow I
2.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2001  viii, 307 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Non-interference and Information Flow
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar
Robust Declassification / S. Zdancewic ; A. Myers
Access Control
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden
Protocols I
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess
Panel
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner
Information Flow and Multi-threading
A New Type System for Secure Information Flow / G. Smith
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld
Protocols II
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani
Intrusion Tolerance and Detection
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor
Logics for Protocol Verification
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic
Logical Relations for Encryption / E. Sumii ; B. Pierce
Secrecy and Privacy
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah
Confined Mobile Functions / Z. Kirli
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen
Author Index
Preface
Workshop Committee
Non-interference and Information Flow
3.

図書

図書
edited by Yves Deswarte ... [et al]
出版情報: Boston : Kluwer Academic Publishers, 2004  xiv, 548 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 147
所蔵情報: loading…
4.

図書

図書
edited by Theo Dimitrakos, Fabio Martinelli
出版情報: New York : Springer, 2005  x, 246 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 173
所蔵情報: loading…
目次情報: 続きを見る
Information Flow Analysis for Probabilistic Timed Automata
Dynamic Security Labels
Pattern-Matching Spi-Calculus
Interactive Trust Management and Negotiation
Tuple-Space Coordination Models
Deploying Network Security Policies
Auditing Accountability in Decentralized Systems
Overriding Access Control
Complementing Computational Protocol Analysis
Information Flow Analysis for Probabilistic Timed Automata
Dynamic Security Labels
Pattern-Matching Spi-Calculus
5.

図書

図書
edited by David Chadwick, Bart Preneel
出版情報: New York : Springer, 2005  xii, 287 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 175
所蔵情報: loading…
6.

図書

図書
edited by Enrico Nardelli, Maurizio Talamo
出版情報: New York : Springer, 2005  vi, 149 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 177
所蔵情報: loading…
目次情報: 続きを見る
Authentication, Encryption, Certification and Traceability in E-Services
Safeguards, Interception, Tracking and Firewall Technology
Administration, Management, Risk Analysis and Organizational Issues
Mobile Access, Network Protocol and Multilateral Security
Certification Authorities
Public Key Infrastructures
Authentication, Encryption, Certification and Traceability in E-Services
Safeguards, Interception, Tracking and Firewall Technology
Administration, Management, Risk Analysis and Organizational Issues
7.

図書

図書
edited by Ryoichi Sasaki ... [et al.]
出版情報: New York : Springer, 2005  xvi, 612 p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 181
所蔵情報: loading…
目次情報: 続きを見る
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
Internet and Web Security
Mobility and Ubiquitous Security
Secure Commercial Systems
Trusted Computing Systems
Accountable Anonymous E-Mail
Protecting Consumer Data in Composite Web Services
Enhancing Security in ERP Systems
Architecture for User Authentication and Key Exchange
A Secure Quantum Communication Protocol Using Insecure Public Channels
Mathematical Models of IP Traceback Methods
Secure Human Communications Based on Biometrics Signals
Designated-Verifier Proxy Signature Schemes
Signcryption in Hierarchical Identity Based Cryptosystem
Security for Multimedia
Digital Signature Schemes
Intrusion Detection
8.

図書

図書
editor, Larry D. Sanson ; sponsored by IEEE Lexington Section, USA ... [et al.]
出版情報: Piscataway, New Jersey : IEEE, c2003  [xviii], 603 p. ; 28 cm
所蔵情報: loading…
9.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2004  viii, 292 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committees
Protocols I
A Theory of Dictionary Attacks and its Complexity / S. Delaune ; F. Jacquemard
Generic Insecurity of Cliques-Type Authenticated Group Key Agreement Protocols / O. Pereira ; J. Quisquater
Abstraction and Refinement in Protocol Derivation / A. Datta ; A. Derek ; J. Mitchell ; D. Pavlovic
Access Control
A Distributed Calculus for Role-Based Access Control / C. Braghin ; D. Gorla ; V. Sassone
From Stack Inspection to Access Control: A Security Analysis for Libraries / F. Besson ; T. Blanc ; C. Fournet ; A. Gordon
Intrusion Detection
Selecting Appropriate Counter-Measures in an Intrusion Detection Framework / F. Cuppens ; T. Sans ; S. Gombault
Using Active Learning in Intrusion Detection / M. Almgren ; E. Jonsson
Information Flow
Secure Information Flow by Self-Composition / G. Barthe ; P. D'Argenio ; T. Rezk
Lenient Array Operations for Practical Secure Information Flow / Z. Deng ; G. Smith
Security Policies
Owned Policies for Information Security / H. Chen ; S. Chong
Cassandra: Flexible Trust Management, Applied to Electronic Health Records / M. Becker ; P. Sewell
The Consistency of Task-Based Authorization Constraints in Workflow Systems / K. Tan ; J. Crampton ; C. Gunter
Declassification and Information Flow
Enforcing Robust Declassification / A. Myers ; A. Sabelfeld ; S. Zdancewic
Modelling Downgrading in Information Flow Security / A. Bossi ; C. Piazza ; S. Rossi
Formal Methods and Cryptography
Symmetric Encryption in a Simulatable Dolev-Yao Style Cryptographic Library / M. Backes ; B. Pfitzmann
Universally Composable Signature, Certification, and Authentication / R. Canetti
Panel: Formal Methods and Cryptography
Authorization
By Reason and Authority: A System for Authorization of Proof-Carrying Code / N. Whitehead ; M. Abadi ; G. Necula
A Formal Foundation for XrML / J. Halpern ; V. Weissman
Protocols II
Formal Analysis of Multi-Party Contract Signing / R. Chadha ; S. Kremer ; A. Scedrov
Symbolic Model Checking the Knowledge of the Dining Cryptographers / K. Su ; R. van der Meyden
Author Index
Preface
Workshop Committees
Protocols I
10.

図書

図書
edited by Sushil Jajodia, Leon Strous
出版情報: Boston : Kluwer Academic, 2004  viii, 253 p. ; 24 cm
シリーズ名: The International Federation for Information Processing ; 140
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼