Computer Security – ESORICS 2003

8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003. Proceedings

  • Einar Snekkenes
  • Dieter Gollmann
Conference proceedings ESORICS 2003

DOI: 10.1007/b13237

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2808)

Table of contents (19 papers)

  1. Front Matter
  2. Signature and Access Control Policies for XML Documents
    Elisa Bertino, Elena Ferrari, Loredana Parasiliti Provenza
    Pages 1-22
  3. Authorization and Access Control in Adaptive Workflows
    Dulce Domingos, António Rito-Silva, Pedro Veiga
    Pages 23-38
  4. Flexible Regulation of Distributed Coalitions
    Xuhui Ao, Naftaly H. Minsky
    Pages 39-60
  5. Initiator-Resilient Universally Composable Key Exchange
    Dennis Hofheinz, Jörn Müller-Quade, Rainer Steinwandt
    Pages 61-84
  6. Precisely Answering Multi-dimensional Range Queries without Privacy Breaches
    Lingyu Wang, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia
    Pages 100-115
  7. Passive Attack Analysis for Connection-Based Anonymity Systems
    Andrei Serjantov, Peter Sewell
    Pages 116-131
  8. Rapid Mixing and Security of Chaum’s Visual Electronic Voting
    Marcin Gomułkiewicz, Marek Klonowski, Mirosław Kutyłowski
    Pages 132-145
  9. Towards Accountable Management of Privacy and Identity Information
    Marco Casassa Mont, Siani Pearson, Pete Bramhall
    Pages 146-161
  10. A Toolkit for Managing Enterprise Privacy Policies
    Michael Backes, Birgit Pfitzmann, Matthias Schunter
    Pages 162-180
  11. Authenticating Mandatory Access Controls and Preserving Privacy for a High-Assurance Smart Card
    Helmut Scherzer, Ran Canetti, Paul A. Karger, Hugo Krawczyk, Tal Rabin, David C. Toll
    Pages 181-200
  12. Hardware Encapsulation of Security Services
    Adrian Baldwin, Simon Shiu
    Pages 201-216
  13. A Formal Security Model of the Infineon SLE 88 Smart Card Memory Management
    David von Oheimb, Georg Walter, Volkmar Lotz
    Pages 217-234
  14. Bridging Model-Based and Language-Based Security
    Rogardt Heldal, Fredrik Hultin
    Pages 235-252
  15. An On-the-Fly Model-Checker for Security Protocol Analysis
    David Basin, Sebastian Mödersheim, Luca Viganò
    Pages 253-270
  16. Symmetric Authentication within a Simulatable Cryptographic Library
    Michael Backes, Birgit Pfitzmann, Michael Waidner
    Pages 271-290
  17. An Improved Reference Flow Control Model for Policy-Based Intrusion Detection
    Jacob Zimmermann, Ludovic Mé, Christophe Bidan
    Pages 291-308
  18. Visualisation for Intrusion Detection
    Stefan Axelsson
    Pages 309-325
  19. On the Detection of Anomalous System Call Arguments
    Christopher Kruegel, Darren Mutz, Fredrik Valeur, Giovanni Vigna
    Pages 326-343

About these proceedings


ESORICS, the European Symposium On Research In Computer Security, is the leading research-oriented conference on the theory and practice of computer - curity in Europe. The aim of ESORICS is to further the progress of research in computer security by establishing a European forum for bringing together - searchersinthisarea,bypromotingtheexchangeofideaswithsystemdevelopers and by encouraging links with researchers in related areas. ESORICS is coordinated by an independent steering committee. In the past it took place every two years at various locations throughout Europe. Starting this year, it will take place annually. ESORICS 2003 was organized by Gjøvik University College, and took place in Gjøvik, Norway, October 13–15, 2003. The program committee received 114 submissions, originating from 26 co- tries on all continents. Half the papers originated in Europe (57). The most dominant countries were: UK (16), USA (14), Germany (6), South Korea (6), Sweden (6), Italy (5), France (4) and Poland (4). Each submission was reviewed by at least three program committee members or other experts. The program committee chair and co-chair were not allowed to submit papers. The ?nal sel- tion of papers was made at a program committee meeting followed by a week of e-mail discussions. Out of the 114 papers received, only 19 got accepted (17%). In comparison, ESORICS 2000and 2002received 75and 83papersand accepted 19% and 16%, respectively. The program re?ected the full range of security research, including access control, cryptographic protocols, privacy enhancing technologies, security m- els, authentication, and intrusion detection.


Smart Card access control attack analysis authentication computer security digital signatures identity internet security network security privacy secure networks security security analysis systems security web service security

Editors and affiliations

  • Einar Snekkenes
    • 1
  • Dieter Gollmann
    • 2
  1. 1.Norwegian Information Security Lab, Department of Computer Science and Media TechnologyGjovik University CollegeGjovikNorway
  2. 2.Institute for Security in Distributed ApplicationsHamburg University of TechnologyHamburgGermany

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20300-1
  • Online ISBN 978-3-540-39650-5
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349