Computer security - ESORICS 2002 : 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002 : proceedings
著者
書誌事項
Computer security - ESORICS 2002 : 7th European Symposium on Research in Computer Security, Zurich, Switzerland, October 14-16, 2002 : proceedings
(Lecture notes in computer science, 2502)
Springer, c2002
大学図書館所蔵 全27件
  青森
  岩手
  宮城
  秋田
  山形
  福島
  茨城
  栃木
  群馬
  埼玉
  千葉
  東京
  神奈川
  新潟
  富山
  石川
  福井
  山梨
  長野
  岐阜
  静岡
  愛知
  三重
  滋賀
  京都
  大阪
  兵庫
  奈良
  和歌山
  鳥取
  島根
  岡山
  広島
  山口
  徳島
  香川
  愛媛
  高知
  福岡
  佐賀
  長崎
  熊本
  大分
  宮崎
  鹿児島
  沖縄
  韓国
  中国
  タイ
  イギリス
  ドイツ
  スイス
  フランス
  ベルギー
  オランダ
  スウェーデン
  ノルウェー
  アメリカ
注記
Includes bibliographical references and index
内容説明・目次
内容説明
ESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations throughout Europe, and is coordinated by an independent Steering Committee. ESORICS 2002 was jointly organized by the Swiss Federal Institute of Te- nology (ETH) and the IBM Zurich Research Laboratory, and took place in Zurich, Switzerland, October 14-16, 2002. The program committee received 83 submissions, originating from 22 co- tries. For fans of statistics: 55 submissions came from countries in Europe, the Middle East, or Africa, 16 came from Asia, and 12from North America. The leading countries were USA (11 submissions), Germany (9), France (7), Italy (7), Japan (6), and UK (6). Each submission was reviewed by at least three p- gram committee members or other experts. Each submission coauthored by a program committee member received two additional reviews. The program c- mittee chair and cochair were not allowed to submit papers. The ?nal selection of papers was made at a program committee meeting and resulted in 16 accepted papers. In comparison, ESORICS 2000 received 75 submissions and accepted 19 of them. The program re?ects the full range of security research: we accepted papers on access control, authentication, cryptography, database security, formal methods, intrusion detection, mobile code security, privacy, secure hardware, and secure protocols. We gratefully acknowledge all authors who submitted papers for their e?orts in maintaining the standards of this conference.
目次
Computational Probabilistic Non-interference.- Bit-Slice Auction Circuit.- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation.- Cardinality-Based Inference Control in Sum-Only Data Cubes.- Outbound Authentication for Programmable Secure Coprocessors.- Hamming Weight Attacks on Cryptographic Hardware - Breaking Masking Defense.- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations.- Authentication for Distributed Web Caches.- Analysing a Stream Authentication Protocol Using Model Checking.- Equal To The Task?.- TINMAN: A Resource Bound Security Checking System for Mobile Code.- Confidentiality-Preserving Refinement is Compositional - Sometimes.- Formal Security Analysis with Interacting State Machines.- Decidability of Safety in Graph-Based Models for Access Control.- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones.- Learning Fingerprints for a Database Intrusion Detection System.
「Nielsen BookData」 より