Computer Security - ESORICS 98: 5th European Symposium on Research in Computer Security, Louvain-la-Neuve, Belgium, September 16-18, 1998, Proceedings

Front Cover
Jean-Jacques Quisquater, Yves Deswarte, Catherine Meadows, Dieter Gollmann
Springer Science & Business Media, Sep 2, 1998 - Business & Economics - 375 pages
This book constitutes the refereed proceedings of the 5th European Symposium on Research in Computer Security, ESORICS 98, held in Louvain-la-Neuve, Belgium, in September 1998.
The 24 revised full papers presented were carefully reviewed and selected from a total of 57 submissions. The papers provide current results from research and development in design and specification of security policies, access control modelling and protocol analysis, mobile systems and anonymity, Java and mobile code, watermarking, intrusion detection and prevention, and specific threads.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Fixed vs VariableLength Patterns for Detecting Suspicious Process Behavior
1
A Tool for Proactive Defense Against the Buffer Overrun Attack
17
A Kernelized Architecture for Multilevel Secure Application Policies
33
Dealing with Multipolicy Security in Large Open Distributed Systems
51
A Flexible Method for Information System Security Policy Specification
67
On the Security of Some Variants of the RSA Signature Scheme
85
Side Channel Cryptanalysis of Product Ciphers
97
On the Security of Digital Tachographs
111
Trusted Third Party Services for Securing Medical Java Applets
209
Cheap Detection of Embedded Copyright Data in DVDVideo
221
A Scheme for Managing Watermarking Keys in the Aquarelle Multimedia Distributed System
241
The Ticket Concept for Copy Control Based on Embedded Signalling
257
Watermarking
275
Authentication and Payment in Future Mobile Systems
277
A New Approach for Protecting Location Information in Mobile Communication Networks
295
A MixMediated Anonymity Service and Its Payment
313

An Authorization Model and Its Formal Semantics
127
Authorization in CORBA Security
143
Rules for Designing Multilevel ObjectOriented Databases
159
Byte Code Verification for Java Smart Cards Based on Model Checking
175
Towards Formalizing the Java Security Architecture of JDK 12
191
A Subjective Metric of Authentication
329
A Sound Logic for Analysing Electronic Commerce Protocols
345
Inductive Analysis of the Secrecy Goals
361
Index
377
Copyright

Other editions - View all

Common terms and phrases