Invited Speaker: Andrei Sabelfeld | |
Dimensions of Declassification in Theory and Practice (Invited Talk) | p. 1 |
Program Security | |
A Static Birthmark of Binary Executables Based on API Call Structure | p. 2 |
Compiling C Programs into a Strongly Typed Assembly Language | p. 17 |
Information Flow Testing: The Third Path Towards Confidentiality Guarantee | p. 33 |
Short Papers on Computer Security | |
Large Scale Simulation of Tor: Modelling a Global Passive Adversary | p. 48 |
Privacy Enhancing Credentials | p. 55 |
Browser Based Agile E-Voting System | p. 62 |
Risk Balance in Exchange Protocols | p. 70 |
Scalable DRM System for Media Portability | p. 78 |
Computational Semantics for Basic Protocol Logic - A Stochastic Approach | p. 86 |
Access Control | |
Management Advantages of Object Classification in Role-Based Access Control (RBAC) | p. 95 |
An Integrated Model for Access Control and Information Flow Requirements | p. 111 |
Digital Rights Management Using a Master Control Device | p. 126 |
Invited Speaker: Joshua Guttman | |
How to do Things with Cryptographic Protocols (Invited Talk) | p. 142 |
Protocols | |
A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols | p. 150 |
An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming | p. 166 |
Secure Verification of Location Claims with Simultaneous Distance Modification | p. 181 |
Invited Speaker: Kazuhiko Kato | |
Modeling and Virtualization for Secure Computing Environments (Invited Talk) | p. 196 |
Intrusion Detection | |
Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces | p. 198 |
A Logical Framework for Evaluating Network Resilience Against Faults and Attacks | p. 212 |
Masquerade Detection Based Upon GUI User Profiling in Linux Systems | p. 228 |
Short Papers on Network Security | |
One-Time Receiver Address in IPv6 for Protecting Unlinkability | p. 240 |
A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts | p. 247 |
Combining Heterogeneous Classifiers for Network Intrusion Detection | p. 254 |
Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments | p. 261 |
Safe Execution | |
On Run-Time Enforcement of Policies | p. 268 |
Static vs Dynamic Typing for Access Control in Pi-Calculus | p. 282 |
A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications | p. 297 |
Author Index | p. 313 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.