000 04209nam a22006015i 4500
001 978-3-540-76929-3
003 DE-He213
005 20240423125608.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540769293
_9978-3-540-76929-3
024 7 _a10.1007/978-3-540-76929-3
_2doi
050 4 _aQA75.5-76.95
072 7 _aUYA
_2bicssc
072 7 _aCOM014000
_2bisacsh
072 7 _aUYA
_2thema
082 0 4 _a004.0151
_223
245 1 0 _aAdvances in Computer Science - ASIAN 2007. Computer and Network Security
_h[electronic resource] :
_b12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings /
_cedited by Iliano Cervesato.
250 _a1st ed. 2007.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2007.
300 _aXI, 316 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v4846
505 0 _aInvited Speaker: Andrei Sabelfeld -- Dimensions of Declassification in Theory and Practice -- A Static Birthmark of Binary Executables Based on API Call Structure -- Compiling C Programs into a Strongly Typed Assembly Language -- Information Flow Testing -- Large Scale Simulation of Tor: -- Privacy Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols -- Scalable DRM System for Media Portability -- Computational Semantics for Basic Protocol Logic – A Stochastic Approach -- Management Advantages of Object Classification in Role-Based Access Control (RBAC) -- An Integrated Model for Access Control and Information Flow Requirements -- Digital Rights Management Using a Master Control Device -- Invited Speaker: Joshua Guttman -- How to do Things with Cryptographic Protocols -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming -- Secure Verification of Location Claims with Simultaneous Distance Modification -- Invited Speaker: Kazuhiko Kato -- Modeling and Virtualization for Secure Computing Environments -- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces -- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver Address in IPv6 for Protecting Unlinkability -- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts -- Combining Heterogeneous Classifiers for Network Intrusion Detection -- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments -- On Run-Time Enforcement of Policies -- Static vs Dynamic Typingfor Access Control in Pi-Calculus -- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.
650 0 _aComputer science.
650 0 _aData structures (Computer science).
650 0 _aInformation theory.
650 0 _aData protection.
650 0 _aAlgorithms.
650 0 _aComputer networks .
650 1 4 _aTheory of Computation.
650 2 4 _aComputer Science Logic and Foundations of Programming.
650 2 4 _aData Structures and Information Theory.
650 2 4 _aData and Information Security.
650 2 4 _aAlgorithms.
650 2 4 _aComputer Communication Networks.
700 1 _aCervesato, Iliano.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540769279
776 0 8 _iPrinted edition:
_z9783540846161
830 0 _aTheoretical Computer Science and General Issues,
_x2512-2029 ;
_v4846
856 4 0 _uhttps://doi.org/10.1007/978-3-540-76929-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c179681
_d179681