Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 2808

ISBN: 3540203001

Size: 4 MB (4469151 bytes)

Pages: 350/354

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Elisa Bertino, Elena Ferrari (auth.), Einar Snekkenes, Dieter Gollmann (eds.)3540203001

ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer – curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together – searchersinthisarea,bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjøvik University College, and took place in Gjøvik, Norway, October 13–15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection.

Table of contents :
Front Matter….Pages –
Signature and Access Control Policies for XML Documents….Pages 1-22
Authorization and Access Control in Adaptive Workflows….Pages 23-38
Flexible Regulation of Distributed Coalitions….Pages 39-60
Initiator-Resilient Universally Composable Key Exchange….Pages 61-84
Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing….Pages 85-99
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches….Pages 100-115
Passive Attack Analysis for Connection-Based Anonymity Systems….Pages 116-131
Rapid Mixing and Security of Chaum’s Visual Electronic Voting….Pages 132-145
Towards Accountable Management of Privacy and Identity Information….Pages 146-161
A Toolkit for Managing Enterprise Privacy Policies….Pages 162-180
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card….Pages 181-200
Hardware Encapsulation of Security Services….Pages 201-216
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management….Pages 217-234
Bridging Model-Based and Language-Based Security….Pages 235-252
An On-the-Fly Model-Checker for Security Protocol Analysis….Pages 253-270
Symmetric Authentication within a Simulatable Cryptographic Library….Pages 271-290
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection….Pages 291-308
Visualisation for Intrusion Detection….Pages 309-325
On the Detection of Anomalous System Call Arguments….Pages 326-343
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Computer Security – ESORICS 2003: 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings”
Shopping Cart
Scroll to Top