close
1.

図書

図書
sponsored by IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. : IEEE Computer Society, c2001  viii, 307 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Non-interference and Information Flow
Noninterference Equations for Nondeterministic Systems / S. Pinsky ; E. Zieglar
Robust Declassification / S. Zdancewic ; A. Myers
Access Control
A State-Transition Model of Trust Management and Access Control / A. Chander ; D. Dean ; J. Mitchell
Revocations--A Classification / A. Hagstrom ; S. Jajodia ; F. Parisi-Presicce ; D. Wijesekera
A Logical Reconstruction of SPKI / J. Halpern ; R. van der Meyden
Protocols I
A Security Analysis of the Cliques Protocols Suites / O. Pereira ; J.-J. Quisquater
An Efficient Cryptographic Protocol Verifier Based on Prolog Rules / B. Blanchet
Proving Secrecy is Easy Enough / V. Cortier ; J. Millen ; H. Ruess
Panel
Relating Cryptography and Cryptographic Protocols / A. Scedrov (Moderator) ; R. Canetti ; J. Guttman ; D. Wagner ; M. Waidner
Information Flow and Multi-threading
A New Type System for Secure Information Flow / G. Smith
A Generic Approach to the Security of Multi-threaded Programs / H. Mantel ; A. Sabelfeld
Protocols II
Authenticity by Typing for Security Protocols / A. Gordon ; A. Jeffrey
Computing Symbolic Models for Verifying Cryptographic Protocols / M. Fiore ; M. Abadi
Protocol Insecurity with Finite Number of Sessions is NP-Complete / M. Rusinowitch ; M. Turuani
Intrusion Tolerance and Detection
Multi-phase Damage Confinement in Database Systems for Intrusion Tolerance / P. Liu
Markov Chains, Classifiers, and Intrusion Detection / S. Jha ; K. Tan ; R. Maxion
Log Auditing through Model-Checking / M. Roger ; J. Goubault-Larrecq
Non-interference: Who Needs It? / P. Ryan (Moderator) ; J. McLean ; V. Gligor
Logics for Protocol Verification
A Compositional Logic for Protocol Correctness / N. Durgin ; D. Pavlovic
Logical Relations for Encryption / E. Sumii ; B. Pierce
Secrecy and Privacy
Privacy-Preserving Cooperative Scientific Computations / W. Du ; M. Atallah
Confined Mobile Functions / Z. Kirli
Confidentiality-Preserving Refinement / M. Heisel ; A. Pfitzmann ; T. Santen
Author Index
Preface
Workshop Committee
Non-interference and Information Flow
2.

図書

図書
edited by Ralf Steinmetz, Jana Dittman, Martin Steinebach
出版情報: Boston : Kluwer Academic Publishers, c2001  x, 393, [34] p. ; 25 cm
シリーズ名: The International Federation for Information Processing ; 64
所蔵情報: loading…
目次情報: 続きを見る
Preface
Conference Committees
Web Security
What You See Is What You Sign - Trustworthy Display of XML Documents for Signing and Verification / K. Scheibelhofer
XML Electronic Signatures / G. Karlinger
An integrated secure Web architecture for protected Mobile code distribution / M. Jalali-Sohi, et al.
Secure and anonymous multicast framework / N. Weiler ; B. Plattner
Vulnerabilities and Security Limitations of current IP Telephony Systems / R. Ackermann, et al. Watermarking I
Quantization Watermarking in the JPEG2000 Coding Pipeline / P. Meerwald
Theoretic Performance Analysis of a Watermarking System based on Bernoulli Chaotic Sequences / S. Tsekeridou, et al.
Scalable Detection of Perceptual Watermarks in JPEG2000 Images / D. Simitopoulos, et al.
Cryptographic Algorithms
Collecting randomness from the net / B. Bencsath ; I. Vajda
Encryption System Based on Neutral Network / C.-K. Chan, et al.
A Modified Chaotic Cryptographic Method / W. Wong, et al.
An Elliptic Curve Random Number Generator / I. Lee ; K. Wong
Watermarking II
Conditional and User Specific Access to Services and Resources Using Annotation Watermarks / J. Dittmann, et al.
Large Scale distributed watermarking of multicast media through encryption / R. Parviainen ; P. Parnes
Copyright Protection Protocols Based on Asymmetric Watermarking: The Ticket Concept / S. Craver ; S. Katzenbeisser
Fingerprints for Copyright Protection / S. Encheva
System Security
Software Security Assessment through Specification Mutations and Fault Injection / R. Kaksonen, et al.
Asynchronous Large-Scale Certification Based on Certificate Verification Trees / J. Domingo-Ferrer, et al.
ACLA: A Framework for Access Control List (ACL) Analysis and Optimization / J. Qian, et al.
Transparent Access to Encrypted Data Using Operating System Network Stack Extensions / E. Rademer ; S.D. Wolthusen
A PC Cryptographic Coprocessor Based on TI Signal Processor and Smart Card System / M. Markovic, et al.
Watermarking III
Optimization of Watermarking Performances Using Error Correcting Codes and Repetition / S. Zinger, et al.
Using Raw Speech as a Watermark, does it work? / P. Nintanavongsa ; T. Amornraksa
Multiple Security Aspects
Transferability in Coin Systems with Observers / C. Fremdt ; H. Neumann
Secure iLearning / F. Graf
Tree-based Multicast Key Agreement / J. Schwenk, et al.
Security for the core network of third generation mobile systems / G. Horn, et al.
Secure Internet Phone / P. Horster, et al.
Posters
Secure Meeting Scheduling with AgenTa / T. Herlea, et al.
Virtual Hidden Network / N. Shin
Gaussian Pixel Weighting Mark in Amplitude Modulation of Color Image Watermarking with 8 Neighborhood Retrieval / R. Puertpan, et al.
A Prepositioned Secret Sharing Scheme for Message Authentification in Broadcast Networks / A. Eskicioglu
Secure Service Centered Networking for Nomadic Usage / M. Hollick
Last Minute Papers
A Secure Authentication Infrastructure for Mobile Communication Services over the Internet / I. Dupre la Tour, et al.
Blind Compressed-Domain Watermarking for MPEG-encoded Videos / C.-L. Wu, et al.
Index of Contributors
Preface
Conference Committees
Web Security
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼