8. ESORICS 2003:
Gjøvik,
Norway
Einar Snekkenes, Dieter Gollmann (Eds.):
Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings.
Lecture Notes in Computer Science 2808 Springer 2003, ISBN 3-540-20300-1 @proceedings{DBLP:conf/esorics/2003,
editor = {Einar Snekkenes and
Dieter Gollmann},
title = {Computer Security - ESORICS 2003, 8th European Symposium on Research
in Computer Security, Gj{\o}vik, Norway, October 13-15, 2003,
Proceedings},
booktitle = {ESORICS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2808},
year = {2003},
isbn = {3-540-20300-1},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza:
Signature and Access Control Policies for XML Documents.
1-22
- Dulce Domingos, António Rito Silva, Pedro Veiga:
Authorization and Access Control in Adaptive Workflows.
23-38
- Xuhui Ao, Naftaly H. Minsky:
Flexible Regulation of Distributed Coalitions.
39-60
- Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt:
Initiator-Resilient Universally Composable Key Exchange.
61-84
- Yuji Watanabe, Masayuki Numao:
Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing.
85-99
- Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia:
Precisely Answering Multi-dimensional Range Queries without Privacy Breaches.
100-115
- Andrei Serjantov, Peter Sewell:
Passive Attack Analysis for Connection-Based Anonymity Systems.
116-131
- Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski:
Rapid Mixing and Security of Chaum's Visual Electronic Voting.
132-145
- Marco Casassa Mont, Siani Pearson, Pete Bramhall:
Towards Accountable Management of Privacy and Identity Information.
146-161
- Michael Backes, Birgit Pfitzmann, Matthias Schunter:
A Toolkit for Managing Enterprise Privacy Policies.
162-180
- Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll:
Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card.
181-200
- Adrian Baldwin, Simon Shiu:
Hardware Encapsulation of Security Services.
201-216
- David von Oheimb, Georg Walter, Volkmar Lotz:
A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment.
217-234
- Rogardt Heldal, Fredrik Hultin:
Bridging Model-Based and Language-Based Security.
235-252
- David A. Basin, Sebastian Mödersheim, Luca Viganò:
An On-the-Fly Model-Checker for Security Protocol Analysis.
253-270
- Michael Backes, Birgit Pfitzmann, Michael Waidner:
Symmetric Authentication within a Simulatable Cryptographic Library.
271-290
- Jacob Zimmermann, Ludovic Mé, Christophe Bidan:
An Improved Reference Flow Control Model for Policy-Based Intrusion Detection.
291-308
- Stefan Axelsson:
Visualisation for Intrusion Detection.
309-325
- Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna:
On the Detection of Anomalous System Call Arguments.
326-343
Copyright © Sun Mar 14 23:02:56 2010
by Michael Ley (ley@uni-trier.de)