close
1.

図書

図書
sponsored by the IEEE Computer Society Technical Committee on Security and Privacy
出版情報: Los Alamitos, Calif. ; Tokyo : IEEE Computer Society, c1999  viii, 239 p. ; 28 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Workshop Committee
Welcome
Formal Models
A Formal Framework and Evaluation Method for Network Denial of Service / C. Meadows
I/O Automaton Models and Proofs for Shared-Key Communication Systems / N. Lynch
Security Protocol Analysis: Notation, Transformation, and Simplification
Safe Simplifying Transformations for Security Protocols / M. Hui ; G. Lowe
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief / D. Monniaux
A Meta-Notation for Protocol Analysis / I. Cervesato ; N. Durgin ; P. Lincoln ; J. Mitchell ; A. Scedrov
Strand Spaces
Mixed Strand Spaces / F. Thayer ; J. Herzog ; J. Guttman
Honest Functions and their Application to the Analysis of Cryptographic Protocols / A. Maneki
Panel: Formalization and Proof of Secrecy Properties / D. Volpano ; M. Abadi ; R. Focardi ; J. Millen
Formalization and Proof of Secrecy Properties
Local Names
Authentication via Localized Names / C. Bodei ; P. Degano ; C. Priami
A Logic for SDSI's Linked Local Name Spaces / J. Halpern ; R. van der Meyden
Interaction and Composition
Trusted System Construction / C. O'Halloran
Secure Composition of Insecure Components / P. Sewell ; J. Vitek
Security Function Interactions / P. Bieber
Logics for Authorization and Access Control
A Logic-based Knowledge Representation for Authorization with Delegation / N. Li ; J. Feigenbaum ; B. Grosof
A Logical Framework for Reasoning on Data Access Control Policies / E. Bertino ; F. Buccafurri ; E. Ferrari ; P. Rullo
Advances in Automated Security Protocol Analysis
Athena: A New Efficient Automatic Checker for Security Protocol Analysis / D. Song
CVS: A Compiler for the Analysis of Cryptographic Protocols / A. Durante ; R. Gorrieri
Noninterference Using Process Algebras
Process Algebra and Non-Interference / P. Ryan ; S. Schneider
What Is Intransitive Noninterference? / A. Roscoe ; M. Goldsmith
Index of Authors
Preface
Workshop Committee
Welcome
2.

図書

図書
V. Michael Bove, Jr. ... [et al.], chairs/editors ; sponsored and publised by SPIE--The International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE--the International Society for Optical Engineering, c1998  viii, 432 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 3228
所蔵情報: loading…
3.

図書

図書
Massimo Felici, Karama Kanoun, Alberto Pasquini (eds.)
出版情報: Berlin ; Tokyo : Springer, c1999  xviii, 482 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1698
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Software Reliability Engineering in Industry / J. D. Musa
Assessment and Certification
A Systematic Approach to Safety Case Maintenance / T. P. Kelly ; J. A. McDermid
SQUALE Dependability Assessment Criteria / Y. Deswarte ; M. Kaâniche ; P. Corneillie ; J. Goodson
Assessment and Certification of Safety-Critical Digital Architectures - The ACRuDA Project / G. Sonneck ; E. Schoitsch
Safety Assessment and Human Factors (Poster Session)
Safety Evaluation of a Train Leader Telephone System / G. Dahll
Safety Analysis Techniques for Validating Formal Models During Verification / R. de Lemos ; A. Saeed
Evaluating the Contribution of DesktopVR for Safety-Critical Applications / C. Johnson
Human Performance Reliability in the Design-for-Usability Life Cycle for Safety Human-Computer Interfaces / L. V. L. Filgueiras
The Impact of Different Media on Safety and Usability of Interactive ATC Applications / F. Paternò ; C. Santoro ; S. Tahmassebi
Human Factors
Patterns for Safer Human-Computer Interfaces / A. Hussey
Impact of Communication on Systems Dependability: Human Factors Perspectives / L. Rognin ; J.-P. Blanquart
A Method for Operator Error Detection Based on Plan Recognition / J. Mo ; Y. Crouzet
Safety Assessment
Hierarchically Performed Hazard Origin and Propagation Studies / Y. Papadopoulos
Hardware Redundant Vital Computer - Demonstration of Safety on the Basis of Current Standards / H. Krebs ; S. Mitra
Design for Safety (Poster Session)
System and Software Safety Analysis for the ERA Control Computer / P.G. Beerthuizen ; W. Kruidhof
Safety Markup Language: Concept and Application / C.-F. Fan ; S. Yih
Extendable Ground-to-Air Communication Architecture for CoDySa / A. Pakstas ; I. Shagaev
Hierarchical Reliability and Safety Models of Fault Tolerant Distributed Industrial Control Systems / J. C. Campelo ; P. Yuste ; F. Rodríguez ; P. J. Gil ; J. J. Serrano
The Development of a Commercial "Shrink-Wrapped Application" to Safety Integrity Level 2: The DUST-EXPERTÖ Story / T. Clement ; I. Cottam ; P. Froome ; C. Jones
Verification and Testing
Safety Verification of Ada 95 Programs Using Software Fault Trees / S.-Y. Min ; Y.-K. Jang ; S.-D. Cha ; Y.-R. Kwon ; D.-H. Bae
Programming Rule Static Verification for Reliable Software / P. Robert
Automated Black-Box Testing with Abstract VDM Oracles / B. K. Aichernig
Towards Statistical Control of an Industrial Test Process / G. Lombardi ; E. Peciola ; R. Mirandola ; A. Bertolino ; E. Marchetti
Design for Safety
Choosing Effective Methods for Diversity - How to Progress from Intuition to Science / P. Popov ; L. Strigini ; A. Romanovsky
A First Step Towards the Integration of Accident Reports and Constructive Design Documents
A Holistic Design Concept to Improve Safety Related Control Systems / M. Wimmer ; A. Rizzo ; M. Sujan
Dependability Analysis and Evaluation
Comparing Fault Trees and Bayesian Networks for Dependability Analysis / A. Bobbio ; L. Portinale ; M. Minichino ; E. Ciancamerla
FlexFi: A Flexible Fault Injection Environment for Microprocessor-Based Systems / A. Benso ; M. Rebaudengo ; M. Sonza Reorda
Structural Software Reliability Estimation / S. Kuball ; J. May ; G. Hughes
Formal Methods and Security (Poster Session)
Hazard Analysis in Formal Specification / K. Sere ; E. Troubitsyna
Modeling Safety-Critical Systems with Z and Petri Nets / M. Heiner ; M. Heisel
On Formal Languages for Sequences of Authorization Transformations / Y. Bai ; V. Varadharajan
Scheduling Fault-Tolerant Programs on Multiple Processors to Maximize Schedule Reliability / I. Czarnowski ; P. Jedrzejowicz ; E. Ratajczak
Formal Methods
Formal Design of Distributed Control Systems with Lustre / P. Caspi ; C. Mazuet ; R. Salem ; D. Weber
Formal Specification and Development of a Safety-Critical Train Management System / A. Chiappini ; A. Cimatti ; C. Porzia ; G. Rotondo ; R. Sebastaini ; P. Traverso ; A. Villafiorita
Formal Validation of the GUARDS Inter-Consistency Mechanism / C. Bernardeschi ; A. Fantechi ; S. Gnesi
A Graphical Environment for the Specification and Verification of Reactive Systems / A. K. Bhattacharjee ; S. D. Dhodapkar ; S. Seshia ; R. K. Shyamasundar
Security
Dependability Requirements and Security Architectures for the Healthcare/Medical Sector / G. Trouessin
Three-Pass Hybrid Key Establishment Protocol Based on ESIGN Signature / S.-M. Lee ; T.-Y. Kim
The Integration of Safety and Security Requirements / D. P. Eames ; J. Moffett
Author Index
Invited Talk
Software Reliability Engineering in Industry / J. D. Musa
Assessment and Certification
4.

図書

図書
Çetin K. Koç, Christof Paar (eds.)
出版情報: Berlin : Springer, c1999  xi, 352 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1717
所蔵情報: loading…
5.

図書

図書
Vijay Varadharajan, Yi Mu (eds.)
出版情報: Berlin : Springer, c1999  xi, 323 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1726
所蔵情報: loading…
目次情報: 続きを見る
Keynote Speech
International Cryptography / Doug McGowan
Cryptanalysis
Reaction attacks against several public key cryptosystems / C. Hall ; I. Goldberg ; B. Schneier
Cryptanalysis of some AES candidate algorithms / W. Wu ; B. Li ; D. Feng ; S. Qing
Language Based Approach to Security
Issues in the design of a language for role based access control / M. Hitchens ; V. Varadharajan
Extending Erlang for safe mobile code execution / L. Brown ; D. Sahlin
Electronic Commerce and Secret Sharing
Detachable electronic coins / C. Pavlovski ; C. Boyd ; E. Foo
Linear secret sharing with divisible shares / J. Pieprzyk
Efficient publicly verifiable secret sharing schemes with fast or delayed recovery / F. Boudot ; J. Traore
Digital Signatures
Zero-knowledge proofs of possession of ElGamal-like digital signatures and its applications / K. Q. Nguyen ; F. Bao ; Y. Mu
Signature scheme for controlled environments / K. Viswanathan ; E. Dawson
On the cryptographic value of the Qth root problem / C. L. Beaver ; P. S. Gemmell ; A. M. Johnston ; W. Neumann
Protecting Critical Information Systems / Sushil Jajodia
Security Protocols
Delegation chains secure up to constant length / M. Abe ; T. Okamoto
Optimal construction of unconditionally secured ID-based key sharing scheme for large-scale networks / G. Hanaoka ; T. Nishioka ; Y. Zheng ; H. Imai
Enhancing the resistance of a provably secure key agreement protocol to a denial-of-service attack / S. Hirose ; K. Matsuura
An extended logic for analyzing timed-release public-key protocols / M. Kudo ; A. Mathuria
Applications
Bringing together X.509 and EDIFACT public key infrastructures: The DEDICA project / M. Rubia ; J. C. Cruellas ; M. Medina
User identification system based on biometrics for keystroke / K. Omote ; E. Okamoto
Boundary conditions that influence decisions about log file formats in multi-application smart cards / C. Markantonakis
Sending message into a definite future / W. Mao
Cryptography
Efficient accumulators without trapdoor / T. Sander
Evolutionary heuristics for finding cryptographically strong S-Boxes / W. Millan ; L. Burnett ; G. Garter ; A. Clark
Incremental authentication of tree-structured documents / P. Ekdahl ; B. Smeets
Complexity and Security Functions
Plateaued Functions / X.-M. Zhang
On the linear complexity of the Naor-Reingold pseudo-random function / F. Griffin ; I. E. Shparlinski
On the channel capacity of narrow-band subliminal channels / K. Kobara
Author Index
Keynote Speech
International Cryptography / Doug McGowan
Cryptanalysis
6.

図書

図書
Masahiro Mambo, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1999  ix, 275 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1729
所蔵情報: loading…
目次情報: 続きを見る
Electronic Money
Spending Programs: A Tool for Flexible Micropayments / Josep Domingo-Ferrer ; Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash / Shouhuai Xu ; Moti Yung ; Gendu Zhang ; Hong Zhu
Engineering an eCash System / Tim Ebringer ; Peter Thorne
Electronic Payment and Unlinkability
Unlinkable Electronic Coupon Protocol with Anonymity Control / Toru Nakanishi ; Nobuaki Haruna ; Yuji Sugiyama
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives / Marc Joye ; Narn-Yih Lee ; Tzonelih Hwang
Secure Software Components, Mobile Agents, and Authentication
Security Properties of Software Components / Khaled Khan ; Jun Han ; Yuliang Zheng
Methods for Protecting a Mobile Agent's Route / Dirk Westhoff ; Markus Schneider ; Claus Unger ; Firoz Kaderali
Non-interactive Cryptosystem for Entity Authentication / Hyung-Woo Lee ; Jung-Eun Kim ; Tai-Yun Kim
Network Security
Implementation of Virtual Private Networks at the Transport Layer / Jorge Davila ; Javier Lopez ; Rene Peralta
Performance Evaluation of Certificate Revocation Using k-Valued Hash Tree / Hiroaki Kikuchi ; Kensuke Abe ; Shohachiro Nakanishi
Active Rebooting Method for Proactivized System: How to Enhance the Security against Latent Virus Attacks / Yuji Watanabe ; Hideki Imai
Digital Watermarking
Highly Robust Image Watermarking Using Complementary Modulations / Chun-Shien Lu ; Hong-Yuan Mark Liao ; Shih-Kun Huang ; Chwen-Jye Sze
Region-Based Watermarking for Images / Gareth Brisbane ; Rei Safavi-Naini ; Philip Ogunbona
Digital Watermarking Robust Against JPEG Compression / Hye-Joo Lee ; Ji-Hwan Park
Protection of Software and Data
Fingerprints for Copyright Software Protection / Josef Pieprzyk
A Secrecy Scheme for MPEG Video Data Using the Joint of Compression and Encryption / Sang Uk Shin ; Kyeong Seop Sim ; Kyung Hyune Rhee
Electronic Money, Key Recovery, and Electronic Voting
On Anonymous Electronic Cash and Crime / Tomas Sander ; Amnon Ta-Shma
On the Difficulty of Key Recovery Systems / Seungjoo Kim ; Insoo Lee ; Masahiro Mambo ; Sungjun Park
An Improvement on a Practical Secret Voting Scheme / Miyako Ohkubo ; Fumiaki Miura ; Masayuki Abe ; Atsushi Fujioka ; Tatsuaki Okamoto
Digital Signatures
Undeniable Confirmer Signature / Khanh Nguyen ; Yi Mu ; Vijay Varadharajan
Extended Proxy Signatures for Smart Cards / Takeshi Okamoto ; Mitsuru Tada ; Eiji Okamoto
A New Digital Signature Scheme on ID-Based Key-Sharing Infrastructures / Tsuyoshi Nishioka ; Goichiro Hanaoka
Cryptanalysis of Two Group Signature Schemes
Author Index
Electronic Money
Spending Programs: A Tool for Flexible Micropayments / Josep Domingo-Ferrer ; Jordi Herrera-Joancomarti
Money Conservation via Atomicity in Fair Off-Line E-Cash / Shouhuai Xu ; Moti Yung ; Gendu Zhang ; Hong Zhu
7.

図書

図書
David Aucsmith (ed.)
出版情報: Berlin : Springer, c1998  ix, 368 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1525
所蔵情報: loading…
8.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c1999  viii, 239 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1550
所蔵情報: loading…
目次情報: 続きを見る
Inductive Analysis of the Internet Protocol TLS / Lawrence C. Paulson
Discussion
External Consistency and the Veri cation of Security Protocols / Simon N. Foley
The Trust Shell Game / Carl Ellison
Overview of the AT&T Labs Trust-Management Project / Joan Feigenbaum
KeyNote: Trust Management for Public-Key Infrastructures / Matt Blaze ; Angelos D. Keromytis
Discussion - Trust Management
Application-Oriented Security Policies and Their Composition / Virgil D. Gligor ; Serban I. Gavrila
Secure Fingerprinting Using Public-Key Cryptography / Hiroshi Yoshiura ; Ryoichi Sasaki ; Kazuo Takaragi
Third Party Certi cation of HTTP Service Access Statistics / Francesco Bergadano ; Pancrazio De Mauro
Delegating Trust / William S. Harbison (Discussion)
Delegation of Responsibility / Bruno Crispo
Abuse of Process / Mark Lomas (Discussion)
A New Concept in Protocols: Veri able Computational Delegation / Peter Landrock
Delegation and Not-So Smart Cards / Bruce Christianson ; James A. Malcolm
Certi cation and Delegation / Michael Roe (Discussion)
Discussion - Di erences Between Academic and Commercial Security / Virgil Gligor ; Mark Lomas ; Raphael Yahalom ; John Warne
Optimistic Trust with Realistic eNvestigators
Insider Fraud / Dieter Gollmann
Panel Session - Future Directions / Stewart Lee ; Roger Needham
Contributor Index
Inductive Analysis of the Internet Protocol TLS / Lawrence C. Paulson
Discussion
External Consistency and the Veri cation of Security Protocols / Simon N. Foley
9.

図書

図書
Eiji Okamoto, George Davida, Masahiro Mambo, (eds.)
出版情報: Berlin ; New York : Springer, c1998  xii, 356 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1396
所蔵情報: loading…
10.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c1998  viii, 216 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1361
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼