↓ Skip to main content

Computer security - ESORICS 2007 : 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007 ; proceedings

Overview of attention for book
Cover of 'Computer security - ESORICS 2007 : 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007 ; proceedings'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Trustworthy Services and the Biological Analogy
  3. Altmetric Badge
    Chapter 2 Security of Multithreaded Programs by Compilation
  4. Altmetric Badge
    Chapter 3 Efficient Proving for Practical Distributed Access-Control Systems
  5. Altmetric Badge
    Chapter 4 Maintaining High Performance Communication Under Least Privilege Using Dynamic Perimeter Control
  6. Altmetric Badge
    Chapter 5 Pragmatic XML Access Control Using Off-the-Shelf RDBMS
  7. Altmetric Badge
    Chapter 6 Conditional Privacy-Aware Role Based Access Control
  8. Altmetric Badge
    Chapter 7 Satisfiability and Resiliency in Workflow Systems
  9. Altmetric Badge
    Chapter 8 Completeness of the Authentication Tests
  10. Altmetric Badge
    Chapter 9 SilentKnock : Practical, Provably Undetectable Authentication
  11. Altmetric Badge
    Chapter 10 Generalized Key Delegation for Hierarchical Identity-Based Encryption
  12. Altmetric Badge
    Chapter 11 Change-Impact Analysis of Firewall Policies
  13. Altmetric Badge
    Chapter 12 Fragmentation and Encryption to Enforce Privacy in Data Storage
  14. Altmetric Badge
    Chapter 13 Information Confinement, Privacy, and Security in RFID Systems
  15. Altmetric Badge
    Chapter 14 A Logic for State-Modifying Authorization Policies
  16. Altmetric Badge
    Chapter 15 Inductive Proofs of Computational Secrecy
  17. Altmetric Badge
    Chapter 16 What, Indeed, Is Intransitive Noninterference?
  18. Altmetric Badge
    Chapter 17 Traceability and Integrity of Execution in Distributed Workflow Management Systems
  19. Altmetric Badge
    Chapter 18 Dynamic Information Flow Control Architecture for Web Applications
  20. Altmetric Badge
    Chapter 19 Cloak: A Ten-Fold Way for Reliable Covert Communications
  21. Altmetric Badge
    Chapter 20 Efficient Password-Based Authenticated Key Exchange Without Public Information
  22. Altmetric Badge
    Chapter 21 Improved Anonymous Timed-Release Encryption
  23. Altmetric Badge
    Chapter 22 Encryption Techniques for Secure Database Outsourcing
  24. Altmetric Badge
    Chapter 23 Click Passwords Under Investigation
  25. Altmetric Badge
    Chapter 24 Graphical Password Authentication Using Cued Click Points
  26. Altmetric Badge
    Chapter 25 Obligations and Their Interaction with Programs
  27. Altmetric Badge
    Chapter 26 On the Privacy of Concealed Data Aggregation
  28. Altmetric Badge
    Chapter 27 Synthesizing Secure Protocols
  29. Altmetric Badge
    Chapter 28 A Cryptographic Model for Branching Time Security Properties – The Case of Contract Signing Protocols
  30. Altmetric Badge
    Chapter 29 Security Evaluation of Scenarios Based on the TCG’s TPM Specification
  31. Altmetric Badge
    Chapter 30 Analyzing Side Channel Leakage of Masked Implementations with Stochastic Methods
  32. Altmetric Badge
    Chapter 31 Insider Attacks Enabling Data Broadcasting on Crypto-Enforced Unicast Links
  33. Altmetric Badge
    Chapter 32 Towards Modeling Trust Based Decisions: A Game Theoretic Approach
  34. Altmetric Badge
    Chapter 33 Extending the Common Services of eduGAIN with a Credential Conversion Service
  35. Altmetric Badge
    Chapter 34 Incorporating Temporal Capabilities in Existing Key Management Schemes
  36. Altmetric Badge
    Chapter 35 A Policy Language for Distributed Usage Control
  37. Altmetric Badge
    Chapter 36 Countering Statistical Disclosure with Receiver-Bound Cover Traffic
  38. Altmetric Badge
    Chapter 37 Renewable Traitor Tracing: A Trace-Revoke-Trace System For Anonymous Attack
  39. Altmetric Badge
    Chapter 38 Modular Access Control Via Strategic Rewriting
  40. Altmetric Badge
    Chapter 39 On the Automated Correction of Security Protocols Susceptible to a Replay Attack
  41. Altmetric Badge
    Chapter 40 Adaptive Soundness of Static Equivalence
Overall attention for this book and its chapters
Altmetric Badge

Mentioned by

twitter
1 X user
patent
3 patents

Citations

dimensions_citation
4 Dimensions

Readers on

mendeley
14 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Title
Computer security - ESORICS 2007 : 12th European Symposium on Research in Computer Security, Dresden, Germany, September 24-26, 2007 ; proceedings
Published by
Springer, January 2007
DOI 10.1007/978-3-540-74835-9
ISBNs
978-3-54-074834-2, 978-3-54-074835-9
Authors

López, Javier, Biskup, J

Editors

Joachim Biskup, Javier López

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 14 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
Luxembourg 1 7%
Unknown 13 93%

Demographic breakdown

Readers by professional status Count As %
Student > Master 8 57%
Researcher 2 14%
Student > Postgraduate 1 7%
Student > Ph. D. Student 1 7%
Unknown 2 14%
Readers by discipline Count As %
Computer Science 8 57%
Engineering 3 21%
Unknown 3 21%