Skip to main content
  • Conference proceedings
  • © 2006

Computer Security – ESORICS 2006

11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4189)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2006.

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (32 papers)

  1. Front Matter

  2. Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors

    • Michael P. Collins, Michael K. Reiter
    Pages 1-17
  3. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses

    • Vitaly Shmatikov, Ming-Hsiu Wang
    Pages 18-33
  4. TrustedPals: Secure Multiparty Computation Implemented with Smart Cards

    • Milan Fort, Felix Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan
    Pages 34-48
  5. Private Information Retrieval Using Trusted Hardware

    • Shuhong Wang, Xuhua Ding, Robert H. Deng, Feng Bao
    Pages 49-64
  6. Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components

    • Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama
    Pages 65-80
  7. License Transfer in OMA-DRM

    • Cheun Ngen Chong, Sorin Iacob, Paul Koster, Javier Montaner, René van Buuren
    Pages 81-96
  8. Enhanced Security Architecture for Music Distribution on Mobile

    • Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud, Michel Milhau
    Pages 97-109
  9. A Formal Model of Access Control for Mobile Interactive Devices

    • Frédéric Besson, Guillaume Dufay, Thomas Jensen
    Pages 110-126
  10. Discretionary Capability Confinement

    • Philip W. L. Fong
    Pages 127-144
  11. Minimal Threshold Closure

    • Xi-Bin Zhao, Kwok-Yan Lam, Guimin Luo, Siu-Leung Chung, Ming Gu
    Pages 145-155
  12. Reducing the Dependence of SPKI/SDSI on PKI

    • Hao Wang, Somesh Jha, Thomas Reps, Stefan Schwoon, Stuart Stubblebine
    Pages 156-173
  13. Delegation in Role-Based Access Control

    • Jason Crampton, Hemanth Khambhammettu
    Pages 174-191
  14. Applying a Security Requirements Engineering Process

    • Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini
    Pages 192-206
  15. HBAC: A Model for History-Based Access Control and Its Model Checking

    • Jing Wang, Yoshiaki Takata, Hiroyuki Seki
    Pages 263-278
  16. A Linear Logic of Authorization and Knowledge

    • Deepak Garg, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter
    Pages 297-312

Other Volumes

  1. Computer Security – ESORICS 2006

Editors and Affiliations

  • Institute for Security in Distributed Applications, Hamburg University of Technology, Hamburg, Germany

    Dieter Gollmann

  • TU Hamburg-Harburg, Hamburg-Harburg, Germany

    Jan Meier

  • Department of Computer Science and Engineering, Chalmers University of Technology, Göteborg, Sweden

    Andrei Sabelfeld

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access