
[Apologies if you receive multiple copies of this message] CALL FOR PARTICIPATION ESORICS 2005 10TH EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER SECURITY Milan, Italy - September 12-14, 2005 http://esorics05.dti.unimi.it/ AIMS AND SCOPE Organized in a series of European countries, ESORICS is confirmed as the European research event in computer security. The symposium started in 1990 and has been held on alternate years in different European countries and attracts an international audience from both the academic and industrial communities. From 2002 it has been held yearly. The Symposium has established itself as one of the premiere, international gatherings on information assurance. PRELIMINARY PROGRAM Monday September 12, 2005 ------------------------- 09:15 - 09:30 Welcome and Opening 09:30 - 10:30 Invited talk -- Barbara Simons 10:30 - 11:00 Coffee break 11:00 - 12:30 Session 1: Access control XML Access Control with Policy Matching Tree N. Qi, M. Kudo Semantic Access Control Model: A Formal Specification M. I. Yague, M. Gallardo, A. Mana A Generic XACML Based Declarative Authorization Scheme for Java R. Gupta, M. Bhide 12:30 - 14:00 Lunch 14:00 - 15:30 Session 2: Advanced Authorization Specifications Specification and Validation of Authorisation Constraints Using UML and OCL K. Sohr, G. Ahn Unified Index for Mobile Object Data and Authorizations V. Atluri, Q. Guo On Obligations M. Hilty, D. Basin, A. Pretschner 15:30 - 16:00 Coffe break 16:00 - 17:30 Session 3: Cryptographic Schemes A Practical, Voter-Verifiable Election Scheme D. Chaum, P.Y.A. Ryan, S.Schneider Machine-Checked Security Proofs of Cryptographic Signature Schemes S. Tarento Sanitizable Signatures G. Ateniese, D. Chou, B. de Medeiros, G. Tsudik Tuesday September 13, 2005 -------------------------- 09:00 - 10:30 Session 4: Cryptographic Protocols Limits of the Cryptographic Realization of Dolev-Yao-style XOR M. Backes, B. Pfitzmann Secure Implementation of Cryptographic Protocols: A Case Study Of Mutual Distrust A. Askarov, A. Sabelfeld Augmented oblivious Polynomial Evaluation Protocol and Its Applications H. Zhu 10:30 - 11:00 Coffee break 11:00 - 12:30 Session 5: Intrusion detection Using Attack Trees to Identify Malicious Attacks from Authorized Insiders I. Ray, N. Poolsapassit An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Network Intrusion Alerts L. Wang, A. Liu, S. Jajodia Towards a Theory of Intrusion Detection G. Di Crescenzo, A. Ghosh, R. Talpade 12:30 - 14:00 Lunch 14:00 - 15:30 Session 6: Network security On Scalability and Modularisation in the Modelling of Network Security Systems J. de Albuquerque, H. Krumm, P. de Geus Sybil resistant DHT routing G. Danezis, R. Anderson Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks F.C. Freiling, T. Holz, G. Wicherski 15:30 - 16:00 Coffee break 16:00 - 17:30 Session 7: Information Flow and Formal Security Properties Quantifying Probabilistic Information Flow in Computational Reactive Systems M. Backes Enforcing Non-safety Security Policies with Program Monitors J. Ligatti, L. Bauer, D. Walker Soundness of Formal Encryption in the Presence of Key-Cycles P. Adao, G. Bana, J. Herzog, A. Scedrov Wednesday September 14, 2005 ---------------------------- 09:00 - 10:30 Session 8: Privacy and Data Protection Privacy Preserving Clustering S. Jha, L. Kruger, P. McDaniel Abstractions Preserving Parameter Confidentiality S. Gurgenas, P. Ochsenschlaeger, C. Rudolpah Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation F. Massacci, J. Mylopoulos, N. Zannone 10:30 - 11:00 Coffee break 11:00 - 12:30 Session 9: Security for protocols and devices Security Notions for Disk Encryption K. Gjosteen Local View Attack on Anonymous Communication M. Gogolewski, M. Klonowski, M. Kutylowski Browser Model for Security Analysis of Browser-Based Protocols T. Gross, B. Pfitzmann, A. Sadeghi REGISTRATION Online registration is available on the conference web page: http://esorics05.dti.unimi.it/registration.php ADDITIONAL INFORMATION On the web pages (http://esorics05.dti.unimi.it), you will find information about the program, the conference hotel and venue, and some travel and tourist information. We look forward to seeing you in Milan at ESORICS 2005.