Skip to main content
  • Conference proceedings
  • © 2003

Computer Security - ESORICS 2003

8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2808)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 2003.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 papers)

  1. Front Matter

  2. Signature and Access Control Policies for XML Documents

    • Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza
    Pages 1-22
  3. Authorization and Access Control in Adaptive Workflows

    • Dulce Domingos, António Rito-Silva, Pedro Veiga
    Pages 23-38
  4. Flexible Regulation of Distributed Coalitions

    • Xuhui Ao, Naftaly H. Minsky
    Pages 39-60
  5. Initiator-Resilient Universally Composable Key Exchange

    • Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt
    Pages 61-84
  6. Precisely Answering Multi-dimensional Range Queries without Privacy Breaches

    • Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia
    Pages 100-115
  7. Passive Attack Analysis for Connection-Based Anonymity Systems

    • Andrei Serjantov, Peter Sewell
    Pages 116-131
  8. Rapid Mixing and Security of Chaum’s Visual Electronic Voting

    • Marcin GomuÅ‚kiewicz, Marek Klonowski, MirosÅ‚aw KutyÅ‚owski
    Pages 132-145
  9. Towards Accountable Management of Privacy and Identity Information

    • Marco Casassa Mont, Siani Pearson, Pete Bramhall
    Pages 146-161
  10. A Toolkit for Managing Enterprise Privacy Policies

    • Michael Backes, Birgit Pfitzmann, Matthias Schunter
    Pages 162-180
  11. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card

    • Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
    Pages 181-200
  12. Hardware Encapsulation of Security Services

    • Adrian Baldwin, Simon Shiu
    Pages 201-216
  13. A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management

    • David von Oheimb, Georg Walter, Volkmar Lotz
    Pages 217-234
  14. Bridging Model-Based and Language-Based Security

    • Rogardt Heldal, Fredrik Hultin
    Pages 235-252
  15. An On-the-Fly Model-Checker for Security Protocol Analysis

    • David Basin, Sebastian Mödersheim, Luca Viganò
    Pages 253-270
  16. Symmetric Authentication within a Simulatable Cryptographic Library

    • Michael Backes, Birgit Pfitzmann, Michael Waidner
    Pages 271-290
  17. An Improved Reference Flow Control Model for Policy-Based Intrusion Detection

    • Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    Pages 291-308
  18. Visualisation for Intrusion Detection

    • Stefan Axelsson
    Pages 309-325
  19. On the Detection of Anomalous System Call Arguments

    • Christopher Kruegel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
    Pages 326-343

Other Volumes

  1. Computer Security – ESORICS 2003

About this book

ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea,bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjøvik University College, and took place in Gjøvik, Norway, October 13–15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) andPoland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection.

Editors and Affiliations

  • Norwegian Information Security Lab, Department of Computer Science and Media Technology, Gjovik University College, Gjovik, Norway

    Einar Snekkenes

  • Institute for Security in Distributed Applications, Hamburg University of Technology, Hamburg, Germany

    Dieter Gollmann

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access