Fourth ESORICS in 1996
Miscellaneous
Go back to main home page, last updated October 1996.
Import the file containing the
references of all articles
of these proceedings (in REFER format).
- Proceedings :
- Computer Security - ESORICS 96
- Fourth European Symposium on Research in Computer Security
- Rome, Italy, September 1996
- Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo (Eds.)
- Lecture Notes in Computer Science, No 1146
- Springer-Verlag
- ISBN 3-540-61770-1
Programme Chair's Preface
The series of European Symposium on Research in Computer Security (ESORICS) represents an important international event in the computer security area. The symposium started in 1990 in Toulouse (France) and is now held every two years in different European countries. It attracts an audience from both the academic and industrial communities. Previous ESORICS meetings were held in Toulouse, France (1990 and 1992), and Brighton, United Kingdom (1994).
In response to the call for papers of ESORICS'96, 58 papers were received from different countries in Europe, America, and Far East. All papers were reviewed by at least three members of the program committee. The program committee was selective and only 21 papers were accepted for inclusion in the symposium program. We are very pleased with the overall quality of the program, covering a wide spectrum of topics, from theoretical issues, to database access control, to networks. Among application areas, electronic commerce has received special attention in ESORICS'96. We gratefully acknowledge all our colleagues who committed their time by submitting papers. The program is well complemented by two panels, the first on firewalls and the second on the protection of authors' rights and copyright. Finally, we are very happy that Peter Landrock, a well-known expert in computer security, has agreed to give the invited talk.
We greatly appreciate the help we received from the members of our cooperative and responsible program committee. Special thanks go to Elena Ferrari, who helped us with the preparation of the PC meeting, and to Maria Grazia Baggi from AICA, who handled the publicity for the symposium.
Elisa Bertino (Programme Chair), Helmut Kurth Emilio Montolivo (Programme Vice-Chair)
Contents of the Proceedings
- Advanced Access Control Models for Database Systems
- An Authorization Model for Workflows
Vijayalakshmi Atluri, Wei-Kuang Huang
(abstract) - Role Hierarchies and Constraints for Lattice-Based Access Controls
Ravi Sandhu
(abstract)
- Distributed Systems
- A Multilevel Security Model For Distributed Object Systems
Vincent Nicomette, Yves Deswarte
(abstract) - An Authorization Model for Federated Systems
Sabrina De Capitani di Vimercati, Pierangela Samarati
(abstract)
- Electronic Commerce
- Development of a Secure Electronic Marketplace for Europe
Michael Waidner
(abstract) - Digital Payment Systems with Passive Anonymity-Revoking Trustees
Jan Camenisch, Ueli Maurer, Markus Stadler
(abstract) - Lightweight Micro-cash for the Internet
Wenbo Mao
(abstract)
- Network Security
- Certified Electronic Mail
Jianying Zhou, Dieter Gollmann
(abstract) - Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches
Catherine A. Meadows
(abstract) - Sleepy Network-Layer Authentification Service
Shyhtsun F. Wu
(abstract) - Modelling a Public-Key Infrastructure
Ueli Maurer
(abstract) - Distributed Proctoring
Bruce Schneier, John Kelsey, Jay Walker
(abstract)
- Panel session
- Limitations of the Approach of Solving a Network's Security Problems with a Firewall
Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik
(abstract)
- Secure Database Architectures
- The Impact of Multilevel Security on Database Buffer Management
Andrew Warner, Qiang Li, Thomas Keefe, Shankar Pal
(abstract) - Secure Concurrency Control in MLS Databases with Two Versions of Data
Luigi V. Mancini, Ray Indrajit
(abstract) - Enhancing the Controlled Disclosure of Sensitive Information
Donald S. Marks, Amihai Motro, Sushil Jajodia
(abstract)
- Security Issues for Mobile Computing Systems
- Server-Supported Signatures
N. Asokan, G. Tsudik, M. Waidner
(abstract) - Security for Mobile Agents: Authentification and State Appraisal
Willian M. Farmer, Joshua D. Guttman, Vipin Swarup
(abstract)
- Theoretical Foundations of Security
- Formal Semantics for Authentification Logics
Gabriele Wedel, Volker Kessler
(abstract) - Merging Heterogeneous Security Orederings
P.A. Bonatti, M.L. Sapino, V.S. Subrahmanian
(abstract) - Threat Scenarios as a Means to Formally Develop Secure Systems
Volkmar Lotz
(abstract) - CSP and Anonymity
Steve Schneider, Abraham Sdiropoulos
(abstract)