+612 9045 4394
 
CHECKOUT
Computer Security - Esorics 2003 : 8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings - Einar Snekkenes

Computer Security - Esorics 2003

8th European Symposium on Research in Computer Security, Gjovik, Norway, October 13-15, 2003, Proceedings

By: Einar Snekkenes (Editor), Dieter Gollmann (Editor)

Paperback

Published: 29th September 2003
Ships: 5 to 9 business days
5 to 9 business days
$135.50
or 4 easy payments of $33.88 with Learn more
if ordered within

ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea, bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjovik University College, and took place in Gjovik, Norway, October 13-15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection.

Signature and Access Control Policies for XML Documentsp. 1
Authorization and Access Control in Adaptive Workflowsp. 23
Flexible Regulation of Distributed Coalitionsp. 39
Initiator-Resilient Universally Composable Key Exchangep. 61
Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processingp. 85
Precisely Answering Multi-dimensional Range Queries without Privacy Breachesp. 100
Passive Attack Analysis for Connection-Based Anonymity Systemsp. 116
Rapid Mixing and Security of Chaum's Visual Electronic Votingp. 132
Towards Accountable Management of Privacy and Identity Informationp. 146
A Toolkit for Managing Enterprise Privacy Policiesp. 162
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Cardp. 181
Hardware Encapsulation of Security Servicesp. 201
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managementp. 217
Bridging Model-Based and Language-Based Securityp. 235
An On-the-Fly Model-Checker for Security Protocol Analysisp. 253
Symmetric Authentication within a Simulatable Cryptographic Libraryp. 271
An Improved Reference Flow Control Model for Policy-Based Intrusion Detectionp. 291
Visualisation for Intrusion Detectionp. 309
On the Detection of Anomalous System Call Argumentsp. 326
Author Indexp. 345
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540203001
ISBN-10: 3540203001
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 350
Published: 29th September 2003
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 1.91
Weight (kg): 0.5