AIMS AND SCOPE
Organized in a series of European countries, ESORICS
is confirmed as
the European research event in computer security. The
symposium
started in 1990 and has been held on alternate years in
different
European countries and attracts an international audience from
both
the academic and industrial communities. From 2002 it has been
held
yearly. The Symposium has established itself as one of the
premiere,
international gatherings on information assurance.
PRELIMINARY PROGRAM
Monday September 12,
2005
-------------------------
09:15 - 09:30
Welcome and Opening
09:30 - 10:30 Invited talk -- Barbara Simons
10:30 - 11:00 Coffee break
11:00 - 12:30
Session 1: Access control
XML Access Control with Policy Matching Tree
N.
Qi, M. Kudo
Semantic Access Control Model: A Formal Specification
M. I. Yague, M.
Gallardo, A. Mana
A Generic XACML Based Declarative Authorization Scheme for Java
R.
Gupta, M. Bhide
12:30 - 14:00 Lunch
14:00 - 15:30 Session
2: Advanced Authorization Specifications
Specification and Validation of
Authorisation Constraints Using UML
and OCL
K. Sohr, G. Ahn
Unified Index for Mobile Object Data and Authorizations
V. Atluri, Q.
Guo
On Obligations
M. Hilty, D. Basin, A. Pretschner
15:30 - 16:00 Coffe break
16:00 - 17:30
Session 3: Cryptographic Schemes
A Practical, Voter-Verifiable Election
Scheme
D. Chaum, P.Y.A. Ryan, S.Schneider
Machine-Checked Security Proofs of Cryptographic Signature Schemes
S.
Tarento
Sanitizable Signatures
G. Ateniese, D. Chou, B. de Medeiros, G.
Tsudik
Tuesday September 13,
2005
--------------------------
09:00 - 10:30
Session 4: Cryptographic Protocols
Limits of the Cryptographic Realization of
Dolev-Yao-style XOR
M. Backes, B. Pfitzmann
Secure Implementation of Cryptographic Protocols: A Case Study Of
Mutual
Distrust
A. Askarov, A. Sabelfeld
Augmented oblivious Polynomial Evaluation Protocol and
Its
Applications
H. Zhu
10:30 - 11:00 Coffee break
11:00 - 12:30
Session 5: Intrusion detection
Using Attack Trees to Identify Malicious
Attacks from Authorized
Insiders
I. Ray, N. Poolsapassit
An Efficient and Unified Approach to Correlating, Hypothesizing,
and
Predicting Network Intrusion Alerts
L. Wang, A. Liu, S. Jajodia
Towards a Theory of Intrusion Detection
G. Di Crescenzo, A. Ghosh, R.
Talpade
12:30 - 14:00 Lunch
14:00 - 15:30 Session
6: Network security
On Scalability and Modularisation in the Modelling of
Network
Security Systems
J. de Albuquerque, H. Krumm, P. de Geus
Sybil resistant DHT routing
G. Danezis, R. Anderson
Botnet Tracking: Exploring a Root-Cause Methodology to
Prevent
Distributed Denial-of-Service Attacks
F.C. Freiling, T. Holz, G.
Wicherski
15:30 - 16:00 Coffee break
16:00 - 17:30
Session 7: Information Flow and Formal Security Properties
Quantifying
Probabilistic Information Flow in Computational
Reactive Systems
M.
Backes
Enforcing Non-safety Security Policies with Program Monitors
J. Ligatti,
L. Bauer, D. Walker
Soundness of Formal Encryption in the Presence of Key-Cycles
P. Adao, G.
Bana, J. Herzog, A. Scedrov
Wednesday September 14,
2005
----------------------------
09:00 -
10:30 Session 8: Privacy and Data Protection
Privacy Preserving
Clustering
S. Jha, L. Kruger, P. McDaniel
Abstractions Preserving Parameter Confidentiality
S. Gurgenas, P.
Ochsenschlaeger, C. Rudolpah
Minimal Disclosure in Hierarchical Hippocratic Databases
with
Delegation
F. Massacci, J. Mylopoulos, N. Zannone
10:30 - 11:00 Coffee break
11:00 - 12:30
Session 9: Security for protocols and devices
Security Notions for Disk
Encryption
K. Gjosteen
Local View Attack on Anonymous Communication
M. Gogolewski, M.
Klonowski, M. Kutylowski
Browser Model for Security Analysis of Browser-Based Protocols
T. Gross,
B. Pfitzmann, A. Sadeghi
ADDITIONAL INFORMATION
On the web pages (
http://esorics05.dti.unimi.it), you
will find
information about the program, the conference hotel and venue,
and
some travel and tourist information. We look forward to seeing you
in
Milan at ESORICS 2005.