Computer Security - ESORICS 2000

6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings

  • Frédéric Cuppens
  • Yves Deswarte
  • Dieter Gollmann
  • Michael Waidner
Conference proceedings ESORICS 2000

DOI: 10.1007/10722599

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1895)

Table of contents (19 papers)

  1. Front Matter
  2. Personal Devices and Smart Cards

    1. Checking Secure Interactions of Smart Card Applets
      P. Bieber, J. Cazin, P. Girard, J. -L. Lanet, V. Wiels, G. Zanon
      Pages 1-16
    2. Verification of a Formal Security Model for Multiapplicative Smart Cards
      Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, Vernon Austel, David Toll
      Pages 17-36
  3. Electronic Commerce Protocols

    1. Secure Anonymous Signature-Based Transactions
      Els Van Herreweghen
      Pages 55-71
    2. Metering Schemes for General Access Structures
      Barbara Masucci, Douglas R. Stinson
      Pages 72-87
  4. Access Control

    1. A Typed Access Control Model for CORBA
      Gerald Brose
      Pages 88-105
    2. A Formal Model for Role-Based Access Control Using Graph Transformation
      Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
      Pages 122-139
  5. Protocol Verification

    1. A Formal Semantics for SPKI
      Jon Howell, David Kotz
      Pages 140-158
    2. Formal Verification of Cardholder Registration in SET
      Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
      Pages 159-174
    3. Automating Data Independence
      P. J. Broadfoot, G. Lowe, A. W. Roscoe
      Pages 175-190
  6. Internet Security

    1. Finding a Connection Chain for Tracing Intruders
      Kunikazu Yoda, Hiroaki Etoh
      Pages 191-205
    2. A Full Bandwidth ATM Firewall
      Olivier Paul, Maryline Laurent, Sylvain Gombault
      Pages 206-221
  7. Security Property Analysis

    1. Analysing Time Dependent Security Properties in CSP Using PVS
      Neil Evans, Steve Schneider
      Pages 222-237
    2. Unwinding Possibilistic Security Properties
      Heiko Mantel
      Pages 238-254
    3. Authentication and Confidentiality via IPsec
      Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
      Pages 255-272
  8. Mobile Agents

    1. A Distributed Access Control Model for Java
      Refik Molva, Yves Roudier
      Pages 291-308

About these proceedings


his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.
The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.


ATM CORBA Computer Security Digital Payment Electronic Commerce Formal Protocol Verification Internet Protocol (IP) Java Mobile Code Network Security Secure Networks Smart Cards formal verification security verification

Editors and affiliations

  • Frédéric Cuppens
    • 1
  • Yves Deswarte
    • 2
  • Dieter Gollmann
    • 3
  • Michael Waidner
    • 4
  1. 1.TELECOM BretagneCesson Sévigné CedexFrance
  2. 2.LAAS-CNRS 
  3. 3.Institute for Security in Distributed ApplicationsHamburg University of TechnologyHamburgGermany
  4. 4.Zurich Research LaboratoryIBM ResearchRüschlikonSwitzerland

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-41031-7
  • Online ISBN 978-3-540-45299-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349