Computer Security - ESORICS 2004: 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004. Proceedings, Volume 9

Front Cover
Pierangela Samarati, Peter Ryan, Dieter Gollmann, Refik Molva
Springer Science & Business Media, Sep 6, 2004 - Business & Economics - 456 pages
ForewordfromtheProgramChairs These proceedings contain the papers selected for presentation at the 9th - ropean Symposium on Research in Computer Security (ESORICS), held during September 13–15, 2004 in Sophia Antipolis, France. In response to the call for papers 159 papers were submitted to the conference. These papers were evaluated on the basis of their signi?cance, novelty,and te- nicalquality. Eachpaper wasreviewedby at leastthree members of the program committee. The program committee meeting was held electronically; there was an intensive discussion over a period of two weeks. Of the papers submitted, 27 were selected for presentation at the conference, giving an acceptance rate lower than 17%. The conference program also included an invited talk. A workshop like this does not just happen; it depends on the volunteer e?orts of ahostofindividuals. Thereisalonglistofpeoplewhovolunteeredtheirtimeand energy to put together the workshopand who deserve special thanks. Thanks to all the members of the program committee, and the external reviewers, for all their hardwork in the paper evaluation. Due to the large number of submissions the program committee members were really required to work hard in a short time frame, and we are very thankful to them for the commitment they showed with their active participation in the electronic discussion.
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

Incorporating Dynamic Constraints in the Flexible Authorization Framework
1
AccessConditionTableDriven Access Control for XML Databases
17
An Algebra for Composing Enterprise Privacy Policies
33
Deriving Attacking and Defending the GDOI Protocol
53
Extended Abstract
73
A Cryptographically Sound DolevYao Style Security Proof of the OtwayRees Protocol
89
A Formalization of Anonymity and Onion Routing
109
Breaking Cauchy ModelBased JPEG Steganography with First Order Statistics
125
A Vector Model of Trust for Developing Trustworthy Systems
260
Parameterized Authentication
276
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
293
Hindering Eavesdropping via IPv6 Opportunistic Encryption
309
On the Role of Key Schedules in Attacks on Iterated Ciphers
322
A PublicKey Encryption Scheme with Pseudorandom Ciphertexts
335
A Host Intrusion Prevention System for Windows Operating Systems
352
Recovering from Rootkits That Trojan the System Call Table
369

Comparison Between Two Practical Mix Designs
141
Immutability for AggregatedCondensed Signatures
160
Extended Abstract
177
Portable and Flexible Document Access Control Mechanisms
193
Possibilistic Information Flow Control in the Presence of Encrypted Communication
209
Noninfluence Noninterference + Nonleakage
225
Security Property Based Administrative Controls
244
Runtime Environment Driven Program Safety
385
Sets Bags and Rock and Roll
407
Redundancy and Diversity in Security
423
Discovering Novel Attack Strategies from INFOSEC Alerts
439
Author Index
457
Copyright

Other editions - View all

Common terms and phrases