7th ESORICS in 2002
|
|
Miscellaneous
Go back to main home page, last updated December 2002.
Import the file containing the
references of all articles
of these proceedings (in REFER format).
- Proceedings :
- Computer Security - ESORICS 2002
- 7th European Symposium on Research in Computer Security
- Zurich, Switzerland, October 2002
- Dieter Gollmann, Günter Karjoth, Michael Waidner (Eds.)
- Lecture Notes in Computer Science, No 2502
- Springer-Verlag
- 283 pages, ISBN 3-540-44345-2
|
|
Preface
ESORICS, the European Symposium on Research in Computer Security, is
the leading research-oriented conference on the theory and practice of
computer security in Europe. It takes place every two years, at various
locations throughout Europe, and is co-ordinated by an independent
Steering Committee.
ESORICS 2002 is jointly organized by the Swiss Federal Institute of
Technology (ETH) and the IBM Zurich Research Laboratory, and takes
place in Zurich, Switzerland.
The program committee received 83 submissions, originating from
22 countries. For fans of statistics: 55 submissions came from countries
in Europe, Middle East, Africa, 16 came from Asia and 12 from North
America. Leading countries were USA (11 submissions), Germany (9),
France (7), Italy (7), Japan (6), UK (6). Each submission was
reviewed by at least 3 program committee members or other experts.
Each submission co-authored by a program committee member received two
additional reviews. The program committee chair and co-chair were not
allowed to submit papers. The final selection of papers was made at a
program committee meeting and resulted in 16 accepted papers. In
comparison, ESORICS 2000 received 75 submissions and accepted
19 of them.
The program reflects the full range of security research: we accepted
papers on access control, authentication, cryptography, database
security, formal methods, intrusion detection, mobile code security,
privacy, secure hardware and secure protocols.
We gratefully acknowledge all authors who submitted papers for their
efforts in maintaining the standards of this conference.
It is also my pleasure to thank the members of the program committee
and the additional reviewers, and the members of the organisation
committee for their work and support.
Michael Waidner
Zurich, August 2002
Contents of the Proceedings
- Crypto
- Computational Probabilistic Non-interference
Michael Backes, Birgit Pfitzmann
(abstract) - Bit Slice Auction Circuit
Kaoru Kurosawa, Wakaha Ogata
(abstract)
- Database
- Cardinality-Based Inference Control in Sum-Only Data Cubes
Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
(abstract) - Confidentiality Policies and Their Enforcement for Controlled Query Evaluation
Joachim Biskup, Piero A. Bonatti
(abstract)
- Formal
- TINMAN: A Resource Bound Security Checking System for Mobile Code
Aloysius K. Mok, Weijiang Yu
(abstract) - Decidability of Safety in Graph-based Models for Access Control
Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
(abstract) - Equal To The Task?
James Heather, Steve Schneider
(abstract) - Formal Security Analysis with Interacting State Machines
David von Oheimb, Volkmar Lotz
(abstract) - Confidentiality-Preserving Refinement is Compositional - Sometimes
Thomas Santen, Maritta Heisel, Andreas Pfitzmann
(abstract) - Analysing a Stream Authentication Protocol using Model Checking
Philippa Broadfoot, Gavin Lowe
(abstract)
- Hardware
- Outbound Authentication for Programmable Secure Coprocessors
Sean W. Smith
(abstract) - Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense
Marcin Gomulkiewicz, Miroslaw Kutylowski
(abstract)
- Intrusion Detection
- Learning Fingerprints For A Database Intrusion Detection System
Sin Yeung Lee, Wai Lup Low, Pei Yuen Wong
(abstract) - Inter-Packet Delay Based Correlation for Tracing Encrypted Connections Through Stepping Stones
Xinyuan Wang, Douglas S. Reeves, S. Felix Wu
(abstract)
- Privacy and Applications
- Authentication for Distributed Web Caches
James Giles, Reiner Sailer, Dinesh Verma, Suresh Chari
(abstract) - A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations
Giles Hogben, Tom Jackson, Marc Wilikens
(abstract)