Proceedings of the 9th ACM Conference on Computer and Communications Security: CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
New York, NY
ACM Press
2002
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | VIII, 276 S. Ill., graph. Darst. |
ISBN: | 1581136129 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV016788586 | ||
003 | DE-604 | ||
005 | 20030603 | ||
007 | t | ||
008 | 030303s2002 ad|| |||| 10||| eng d | ||
020 | |a 1581136129 |9 1-58113-612-9 | ||
035 | |a (OCoLC)249624706 | ||
035 | |a (DE-599)BVBBV016788586 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-20 |a DE-91G |a DE-83 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 460f |2 stub | ||
111 | 2 | |a CCS |n 9 |d 2002 |c Washington, DC |j Verfasser |0 (DE-588)10052968-9 |4 aut | |
245 | 1 | 0 | |a Proceedings of the 9th ACM Conference on Computer and Communications Security |b CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 |c ed. by: Vijay Atluri |
264 | 1 | |a New York, NY |b ACM Press |c 2002 | |
300 | |a VIII, 276 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2002 |z Washington DC |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Atluri, Vijay |e Sonstige |4 oth | |
710 | 2 | |a Association for Computing Machinery |e Sonstige |0 (DE-588)1222-1 |4 oth | |
856 | 4 | 2 | |m Digitalisierung TU Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010233865&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-010233865 |
Datensatz im Suchindex
_version_ | 1804129869503660032 |
---|---|
adam_text | Table
of
Contents
Conference Committee
.................................................................................................................................
vü
Contributions
......................................................................................................................................................
vii
Program Committee
................................................................................................................................
vü-vüí
External Reviewers
........................................................................................................................................viii
Session: Cryptographic Protocols
•
Authenticated Encryption in SSH:
Provably
Fixing the SSH Binary Packet Protocol
.....................1
Mihir Bellare. Tadayoshi Kohno (Univ. of California at San Diego), Chanathip Namprempre (Thammasat Univ. Thailand)
•
The Verification of an Industrial Payment Protocol: The SET Purchase Phase
..............................12
Giampaolo Bella (University of Cambridge).
Fabio Massacci (Università di Trento).
Lawrence
С.
Paulson (University of Cambridge)
•
Design and Implementation of the idemix Anonymous Credential System
.....................................21
Jan Camenisch, Els Van Herreweghen (Zurich Research Laboratory)
Session: Key Management and Key Exchange
•
A Temporal Key Management Scheme for Secure Broadcasting of XML Documents
..................31
Elisa
Bertino,
Barbara
Carminati
(DSI
Università di Milano), Elena Ferrari (DCFM Università dell Insurbria)
•
A
Key-Management Scheme for Distributed Sensor Networks
...........................................................41
Laurent Eschenauer, Virgil D. Gligor (University of Maryland)
•
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols
............................................48
William Aiello, Steven M. Bellovin, Matt Blaze (AT&TLabs Research),
Ran
Canetti
(IBM T.J. Watson Research Center). John Ioannidis (AT&TLabs Research),
Angelos D. Keromytis (Columbia University), Omer
Reingold
(AT&TLabs Research)
Session: Emerging Applications
•
Defending Against Redirect Attacks in Mobile IP
...................................................................................59
Robert H. Deng. Jianying Zhou. Feng
Bao
(Labs for Information Technology)
•
Almost Entirely Correct Mixing With Applications to Voting
...............................................................68
Dan Boneh. Philippe Golle (Stanford University)
•
DRM: Doesn t Really Mean Digital Copyright Management
.................................................................
7g
L
Jean Camp (Kennedy School Of Government)
Session: Crytography
•
Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems
.........................................
8S
Christian
Cachiri.
Klaus Kursawe. Anna Lysyanskaya.
Reto
Stróbl
łZiirich
Research Laboratory)
•
Authenticated-Encryption with Associated-Data
....................................................................................9
s
Phillip Rogaway (University of California at Davis)
•
Generic Implementations of Elliptic Curve Cryptography using Partial Reduction
.....................
ION
Nils
Gura.
Hans Eberle.
Sheuelini: Chan« Shantz
t
Sun Microsystem·;)
Session: Network
Security
•
Efficient
Packet
Marking for Large-Scale IP Traceback
......................................................................117
Michael T. Goodrich
(Universit}-
of California at Irvine)
•
Sensor-Based Intrusion Detection for Intra-Domain Distance-Vector Routing
.............................127
Vishal Mittal, Giovanni
Vigna
(University of California at Santa Barbara)
•
Code Red Worm Propagation Modeling and Analysis
.........................................................................138
Cliff Changchun
Zou, Weibo
Gong, Don Towsley (University of Massachusetts)
Session: Authentication and Authorization
•
Silicon Physical Random Functions
.........................................................................................................148
Blaise
Gassend, Dwaine
Clarke, Marten van
Dijk, Srinivas
Devadas (Massachusetts Institute of Technology)
•
Securing Passwords Against Dictionary Attacks
.................................................................................161
Benny Pinkas (HP Labs, Rutgers University),
Tomas
Sander (HP Labs)
•
Policy Algebras for Access Control
—
The Predicate Case
...............................................................171
Duminda Wijesekera, Sushil Jajodia (George Mason University)
Session: Peer to Peer Networks
•
Query-Flood DoS Attacks in Gnutella
......................................................................................................181
Neil Daswani. Hector Garcia-Molina (Stanford University)
•
Tarzan:
A Peer-to-Peer Anonymizing Network Layer
...........................................................................193
Michael J. Freedman (NYU), Robert Morris (MIT Lab for Computer Science)
•
A Reputation-Based Approach for Choosing Reliable Resources
in Peer-to-Peer Networks
.............................................................................................................................207
Ernesto Damiani
(DTI-Università di Mi/ano),
Sabrina De
Capitani di Vimercati (DEA-Università di
Brescia),
Stefano Paraboschi (DEI-Politecnico di Milano),
Pierangela Samarati
(DTI-Università di Milano),
Fabio Violante (DEI-Po/itecnico di Milano)
Session: Analysis and Verification
•
Scalable, Graph-Based Network Vulnerability Analysis
.....................................................................217
Paul Ammann, Duminda Wijesekera. Saket Kaushik (Gerore Mason University)
•
Runtime Verification of Authorization Hook Placement for the Linux Security
Modules Framework
.....................................................................................................................................225
Antony F.d ards. Trent Jaeger. Xialoan Zhang (IBM T.J. Watson Research Center)
•
MOPS: an Infrastructure for Examining Security Properties of Software
......................................235
Hao Chen. David Wagner (University of California at Berkeley)
Session: Intrusion Detection
•
Constructing Attack Scenarios through Correlation of Intrusion Alerts
........................................245
Peng
Ning.
Y
un Cui. Douglas
S.
Reeves
(УС
State University)
•
Mimicry Attacks on Host-Based Intrusion Detection Systems
..........................................................255
Dd id Wagner. Paolo
Soto
I University of California at Berkeley)
•
Specification-based Anomaly Detection: A New Approach for Detecting
Network Intrusions
........................................................................................................................................265
R. Sekar. A. Gupta. J.
Frullo.
T.
Shanbhag. A. Tivvari. H. Yang. S. Zhou (Stony Brook University)
Author Index
......................................................................................................................................................275
|
any_adam_object | 1 |
author_corporate | CCS Washington, DC |
author_corporate_role | aut |
author_facet | CCS Washington, DC |
author_sort | CCS Washington, DC |
building | Verbundindex |
bvnumber | BV016788586 |
classification_rvk | ST 276 |
classification_tum | DAT 460f |
ctrlnum | (OCoLC)249624706 (DE-599)BVBBV016788586 |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01811nam a2200421 c 4500</leader><controlfield tag="001">BV016788586</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030603 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">030303s2002 ad|| |||| 10||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1581136129</subfield><subfield code="9">1-58113-612-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)249624706</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV016788586</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-20</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">CCS</subfield><subfield code="n">9</subfield><subfield code="d">2002</subfield><subfield code="c">Washington, DC</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)10052968-9</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of the 9th ACM Conference on Computer and Communications Security</subfield><subfield code="b">CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002</subfield><subfield code="c">ed. by: Vijay Atluri</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">ACM Press</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 276 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2002</subfield><subfield code="z">Washington DC</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Atluri, Vijay</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Association for Computing Machinery</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1222-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung TU Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010233865&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-010233865</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2002 Washington DC gnd-content |
genre_facet | Konferenzschrift 2002 Washington DC |
id | DE-604.BV016788586 |
illustrated | Illustrated |
indexdate | 2024-07-09T19:11:59Z |
institution | BVB |
institution_GND | (DE-588)10052968-9 (DE-588)1222-1 |
isbn | 1581136129 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-010233865 |
oclc_num | 249624706 |
open_access_boolean | |
owner | DE-20 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-20 DE-91G DE-BY-TUM DE-83 |
physical | VIII, 276 S. Ill., graph. Darst. |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | ACM Press |
record_format | marc |
spelling | CCS 9 2002 Washington, DC Verfasser (DE-588)10052968-9 aut Proceedings of the 9th ACM Conference on Computer and Communications Security CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 ed. by: Vijay Atluri New York, NY ACM Press 2002 VIII, 276 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2002 Washington DC gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Rechnernetz (DE-588)4070085-9 s Datensicherung (DE-588)4011144-1 s Atluri, Vijay Sonstige oth Association for Computing Machinery Sonstige (DE-588)1222-1 oth Digitalisierung TU Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010233865&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Proceedings of the 9th ACM Conference on Computer and Communications Security CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4070085-9 (DE-588)4011144-1 (DE-588)1071861417 |
title | Proceedings of the 9th ACM Conference on Computer and Communications Security CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 |
title_auth | Proceedings of the 9th ACM Conference on Computer and Communications Security CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 |
title_exact_search | Proceedings of the 9th ACM Conference on Computer and Communications Security CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 |
title_full | Proceedings of the 9th ACM Conference on Computer and Communications Security CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 ed. by: Vijay Atluri |
title_fullStr | Proceedings of the 9th ACM Conference on Computer and Communications Security CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 ed. by: Vijay Atluri |
title_full_unstemmed | Proceedings of the 9th ACM Conference on Computer and Communications Security CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 ed. by: Vijay Atluri |
title_short | Proceedings of the 9th ACM Conference on Computer and Communications Security |
title_sort | proceedings of the 9th acm conference on computer and communications security ccs 2002 washington dc usa november 18 22 2002 |
title_sub | CCS 2002 ; Washington, DC, USA, November 18 - 22, 2002 |
topic | Computersicherheit (DE-588)4274324-2 gnd Rechnernetz (DE-588)4070085-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Computersicherheit Rechnernetz Datensicherung Konferenzschrift 2002 Washington DC |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=010233865&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ccswashingtondc proceedingsofthe9thacmconferenceoncomputerandcommunicationssecurityccs2002washingtondcusanovember18222002 AT atlurivijay proceedingsofthe9thacmconferenceoncomputerandcommunicationssecurityccs2002washingtondcusanovember18222002 AT associationforcomputingmachinery proceedingsofthe9thacmconferenceoncomputerandcommunicationssecurityccs2002washingtondcusanovember18222002 |