Online Library TheLib.net » Computer Security — ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings
cover of the book Computer Security — ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings

Ebook: Computer Security — ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings

00
27.01.2024
0
0

ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations throughout Europe, and is coordinated by an independent Steering Committee. ESORICS 2002 was jointly organized by the Swiss Federal Institute of Te- nology (ETH) and the IBM Zurich Research Laboratory, and took place in Zurich, Switzerland, October 14-16, 2002. The program committee received 83 submissions, originating from 22 co- tries. For fans of statistics: 55 submissions came from countries in Europe, the Middle East, or Africa, 16 came from Asia, and 12from North America. The leading countries were USA (11 submissions), Germany (9), France (7), Italy (7), Japan (6), and UK (6). Each submission was reviewed by at least three p- gram committee members or other experts. Each submission coauthored by a program committee member received two additional reviews. The program c- mittee chair and cochair were not allowed to submit papers. The ?nal selection of papers was made at a program committee meeting and resulted in 16 accepted papers. In comparison, ESORICS 2000 received 75 submissions and accepted 19 of them. The program re?ects the full range of security research: we accepted papers on access control, authentication, cryptography, database security, formal methods, intrusion detection, mobile code security, privacy, secure hardware, and secure protocols. We gratefully acknowledge all authors who submitted papers for their e?orts in maintaining the standards of this conference.




This book constitutes the refereed proceedings of the 7th European Symposium on Research in Computer Security, ESORICS 2002, held in Zurich, Switzerland, in October 2002.
The 16 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. Among the topics addressed are confidentiality, probabilistic non-inference, auctions, inference control, authentication, attacks on cryptographic hardware, privacy protection, model checking protocols, mobile code, formal security analysis, access control, and fingerprints and intrusion detection.


This book constitutes the refereed proceedings of the 7th European Symposium on Research in Computer Security, ESORICS 2002, held in Zurich, Switzerland, in October 2002.
The 16 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. Among the topics addressed are confidentiality, probabilistic non-inference, auctions, inference control, authentication, attacks on cryptographic hardware, privacy protection, model checking protocols, mobile code, formal security analysis, access control, and fingerprints and intrusion detection.
Content:
Front Matter....Pages I-X
Computational Probabilistic Non-interference....Pages 1-23
Bit-Slice Auction Circuit....Pages 24-38
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation....Pages 39-55
Cardinality-Based Inference Control in Sum-Only Data Cubes....Pages 55-71
Outbound Authentication for Programmable Secure Coprocessors....Pages 72-89
Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense....Pages 90-103
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations....Pages 104-125
Authentication for Distributed Web Caches....Pages 126-146
Analysing a Stream Authentication Protocol Using Model Checking....Pages 146-162
Equal To The Task?....Pages 162-177
TINMAN: A Resource Bound Security Checking System for Mobile Code....Pages 178-193
Confidentiality-Preserving Refinement is Compositional — Sometimes....Pages 194-211
Formal Security Analysis with Interacting State Machines....Pages 212-229
Decidability of Safety in Graph-Based Models for Access Control....Pages 229-244
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones....Pages 244-263
Learning Fingerprints for a Database Intrusion Detection System....Pages 264-279
Back Matter....Pages 281-281


This book constitutes the refereed proceedings of the 7th European Symposium on Research in Computer Security, ESORICS 2002, held in Zurich, Switzerland, in October 2002.
The 16 revised full papers presented were carefully reviewed and selected for inclusion in the proceedings. Among the topics addressed are confidentiality, probabilistic non-inference, auctions, inference control, authentication, attacks on cryptographic hardware, privacy protection, model checking protocols, mobile code, formal security analysis, access control, and fingerprints and intrusion detection.
Content:
Front Matter....Pages I-X
Computational Probabilistic Non-interference....Pages 1-23
Bit-Slice Auction Circuit....Pages 24-38
Confidentiality Policies and Their Enforcement for Controlled Query Evaluation....Pages 39-55
Cardinality-Based Inference Control in Sum-Only Data Cubes....Pages 55-71
Outbound Authentication for Programmable Secure Coprocessors....Pages 72-89
Hamming Weight Attacks on Cryptographic Hardware — Breaking Masking Defense....Pages 90-103
A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations....Pages 104-125
Authentication for Distributed Web Caches....Pages 126-146
Analysing a Stream Authentication Protocol Using Model Checking....Pages 146-162
Equal To The Task?....Pages 162-177
TINMAN: A Resource Bound Security Checking System for Mobile Code....Pages 178-193
Confidentiality-Preserving Refinement is Compositional — Sometimes....Pages 194-211
Formal Security Analysis with Interacting State Machines....Pages 212-229
Decidability of Safety in Graph-Based Models for Access Control....Pages 229-244
Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones....Pages 244-263
Learning Fingerprints for a Database Intrusion Detection System....Pages 264-279
Back Matter....Pages 281-281
....
Download the book Computer Security — ESORICS 2002: 7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14–16, 2002 Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen