Skip to main content
  • Conference proceedings
  • © 2000

Computer Security - ESORICS 2000

6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1895)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (19 papers)

  1. Front Matter

  2. Personal Devices and Smart Cards

    1. Checking Secure Interactions of Smart Card Applets

      • P. Bieber, J. Cazin, P. Girard, J. -L. Lanet, V. Wiels, G. Zanon
      Pages 1-16
    2. Verification of a Formal Security Model for Multiapplicative Smart Cards

      • Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll
      Pages 17-36
  3. Electronic Commerce Protocols

    1. Secure Anonymous Signature-Based Transactions

      • Els Van Herreweghen
      Pages 55-71
    2. Metering Schemes for General Access Structures

      • Barbara Masucci, Douglas R. Stinson
      Pages 72-87
  4. Access Control

    1. A Typed Access Control Model for CORBA

      • Gerald Brose
      Pages 88-105
    2. A Formal Model for Role-Based Access Control Using Graph Transformation

      • Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
      Pages 122-139
  5. Protocol Verification

    1. A Formal Semantics for SPKI

      • Jon Howell, David Kotz
      Pages 140-158
    2. Formal Verification of Cardholder Registration in SET

      • Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
      Pages 159-174
    3. Automating Data Independence

      • P. J. Broadfoot, G. Lowe, A. W. Roscoe
      Pages 175-190
  6. Internet Security

    1. Finding a Connection Chain for Tracing Intruders

      • Kunikazu Yoda, Hiroaki Etoh
      Pages 191-205
    2. A Full Bandwidth ATM Firewall

      • Olivier Paul, Maryline Laurent, Sylvain Gombault
      Pages 206-221
  7. Security Property Analysis

    1. Analysing Time Dependent Security Properties in CSP Using PVS

      • Neil Evans, Steve Schneider
      Pages 222-237
    2. Unwinding Possibilistic Security Properties

      • Heiko Mantel
      Pages 238-254
    3. Authentication and Confidentiality via IPsec

      • Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
      Pages 255-272
  8. Mobile Agents

    1. A Distributed Access Control Model for Java

      • Refik Molva, Yves Roudier
      Pages 291-308

About this book

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.
The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Editors and Affiliations

  • TELECOM Bretagne, Cesson Sévigné Cedex, France

    Frédéric Cuppens

  • LAAS-CNRS,  

    Yves Deswarte

  • Institute for Security in Distributed Applications, Hamburg University of Technology, Hamburg, Germany

    Dieter Gollmann

  • Zurich Research Laboratory, IBM Research, Rüschlikon, Switzerland

    Michael Waidner

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access