8th ESORICS in 2003
|
|
Miscellaneous
Go back to main home page, last updated December 2003.
Import the file containing the
references of all articles
of these proceedings (in REFER format).
- Proceedings :
- Computer Security - ESORICS 2003
- 8th European Symposium on Research in Computer Security
- Gjøvik, Norway, October 2003
- Dieter Gollmann, Einar Snekkenes (Eds.)
- Lecture Notes in Computer Science, No 2808
- Springer-Verlag
- 350 pages, ISBN 3-540-20300-1
|
|
Preface
ESORICS, the European Symposium On Research In Computer Security, is the
leading research-oriented conference on the theory and practice of computer se-
curity in Europe. The aim of ESORICS is to further the progress of research in
computer security by establishing a European forum for bringing together re-
searchers in this area, by promoting the exchange of ideas with system developers
and by encouraging links with researchers in related areas.
ESORICS is coordinated by an independent steering committee. In the past
it took place every two years at various locations throughout Europe. Starting
this year, it will take place annually.
ESORICS 2003 was organized by Gjøvik University College, and took place
in Gjøvik, Norway, October 1315, 2003.
The program committee received 114 submissions, originating from 26 coun-
tries on all continents. Half the papers originated in Europe (57). The most
dominant countries were: UK (16), USA (14), Germany (6), South Korea (6),
Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed
by at least three program committee members or other experts. The program
committee chair and co-chair were not allowed to submit papers. The final selec-
tion of papers was made at a program committee meeting followed by a week of
e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%).
In comparison, ESORICS 2000 and 2002 received 75 and 83 papers and accepted
19% and 16%, respectively.
The program reflected the full range of security research, including access
control, cryptographic protocols, privacy enhancing technologies, security mod-
els, authentication, and intrusion detection.
The program committee gratefully acknowledges all authors who submitted
papers for their efforts in maintaining the standards of this conference.
It is also my pleasure to thank the members of the program committee, the
additional reviewers, and the members of the organization committee for their
work and support.
Einar Snekkenes
Gjøvik, October 2003
Contents of the Proceedings
- Access Control
- Authorization and Access Control in Adaptive Workflows
Dulce Domingos, António Rito-Silva, Pedro Veiga
(abstract) - Signature and Access Control Policies for XML Documents
Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza
(abstract) - Flexible Regulation of Distributed Coalitions
Xuhui Ao, Naftaly H. Minsky
(abstract)
- Authentication
- An On-the-Fly Model-Checker for Security Protocol Analysis
David Basin, Sebastian Mödersheim, Luca Viganò
(abstract) - Symmetric Authentication within a Simulatable Cryptographic Library
Michael Backes, Birgit Pfitzmann, Michael Waidner
(abstract)
- Crypto Protocols
- Multi-round Secure Light-Weight Broadcast Exclusion Protocol with Pre-processing
Yuji Watanabe, Masayuki Numao
(abstract) - Initiator-Resilient Universally Composable Key Exchange
Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt
(abstract)
- Intrusion Detection
- On the Detection of Anomalous System Call Arguments
Christopher Kruegel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
(abstract) - An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
Jacob Zimmermann, Ludovic Mé, Christophe Bidan
(abstract) - Visualisation for Intrusion Detection Hooking the Worm
Stefan Axelsson
(abstract)
- Privacy Enhancing Technology Applications
- A Toolkit for Managing Enterprise Privacy Policies
Michael Backes, Birgit Pfitzmann, Matthias Schunter
(abstract) - Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
(abstract) - Towards Accountable Management of Privacy and Identity Information
Marco Casassa Mont, Siani Pearson, Pete Bramhall
(abstract)
- Privacy Enhancing Technology Theory
- Rapid Mixing and Security of Chaum's Visual Electronic Voting
Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski
(abstract) - Precisely Answering Multi-dimensional Range Queries without Privacy Breaches
Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia
(abstract) - Passive Attack Analysis for Connection-Based Anonymity Systems
Andrei Serjantov, Peter Sewell
(abstract)
- Security models and applications
- Hardware Encapsulation of Security Services
Adrian Baldwin, Simon Shiu
(abstract) - Bridging Model-Based and Language-Based Security
Rogardt Heldal, Fredrik Hultin
(abstract) - A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management
David von Oheimb, Georg Walter, Volkmar Lotz
(abstract)