[Apologies if you receive multiple copies of this message]
 
CALL FOR PARTICIPATION
ESORICS 2005
10TH EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER SECURITY
Milan, Italy - September 12-14, 2005
 
http://esorics05.dti.unimi.it/

AIMS AND SCOPE
Organized in a series of European countries, ESORICS is confirmed as
the European research event in computer security. The symposium
started in 1990 and has been held on alternate years in different
European countries and attracts an international audience from both
the academic and industrial communities. From 2002 it has been held
yearly. The Symposium has established itself as one of the premiere,
international gatherings on information assurance.
 

PRELIMINARY PROGRAM
 
Monday September 12, 2005
-------------------------
    
09:15 - 09:30 Welcome and Opening
 
09:30 - 10:30 Invited talk -- Barbara Simons
 
10:30 - 11:00 Coffee break
    
11:00 - 12:30 Session 1: Access control
XML Access Control with Policy Matching Tree
N. Qi, M. Kudo
 
Semantic Access Control Model: A Formal Specification
M. I. Yague, M. Gallardo, A. Mana
 
A Generic XACML Based Declarative Authorization Scheme for Java
R. Gupta, M. Bhide
 
12:30 - 14:00 Lunch
    
14:00 - 15:30 Session 2: Advanced Authorization Specifications
Specification and Validation of Authorisation Constraints Using UML
and OCL
K. Sohr, G. Ahn
 
Unified Index for Mobile Object Data and Authorizations
V. Atluri, Q. Guo
 
On Obligations
M. Hilty, D. Basin, A. Pretschner
 
15:30 - 16:00 Coffe break
    
16:00 - 17:30 Session 3: Cryptographic Schemes
A Practical, Voter-Verifiable Election Scheme
D. Chaum, P.Y.A. Ryan, S.Schneider
 
Machine-Checked Security Proofs of Cryptographic Signature Schemes
S. Tarento
 
Sanitizable Signatures
G. Ateniese, D. Chou, B. de Medeiros, G. Tsudik
 
    
Tuesday September 13, 2005
--------------------------
    
09:00 - 10:30 Session 4: Cryptographic Protocols
Limits of the Cryptographic Realization of Dolev-Yao-style XOR
M. Backes, B. Pfitzmann
 
Secure Implementation of Cryptographic Protocols: A Case Study Of
Mutual Distrust
A. Askarov, A. Sabelfeld
 
Augmented oblivious Polynomial Evaluation Protocol and Its
Applications
H. Zhu
 
10:30 - 11:00 Coffee break
    
11:00 - 12:30 Session 5: Intrusion detection
Using Attack Trees to Identify Malicious Attacks from Authorized
Insiders
I. Ray, N. Poolsapassit
 
An Efficient and Unified Approach to Correlating, Hypothesizing,
and Predicting Network Intrusion Alerts
L. Wang, A. Liu, S. Jajodia
 
Towards a Theory of Intrusion Detection
G. Di Crescenzo, A. Ghosh, R. Talpade
 
12:30 - 14:00 Lunch
    
14:00 - 15:30 Session 6: Network security
On Scalability and Modularisation in the Modelling of Network
Security Systems
J. de Albuquerque, H. Krumm, P. de Geus
 
Sybil resistant DHT routing
G. Danezis, R. Anderson
 
Botnet Tracking: Exploring a Root-Cause Methodology to Prevent
Distributed Denial-of-Service Attacks
F.C. Freiling, T. Holz, G. Wicherski
 
15:30 - 16:00 Coffee break
    
16:00 - 17:30 Session 7: Information Flow and Formal Security Properties
Quantifying Probabilistic Information Flow in Computational
Reactive Systems
M. Backes
 
Enforcing Non-safety Security Policies with Program Monitors
J. Ligatti, L. Bauer, D. Walker
 
Soundness of Formal Encryption in the Presence of Key-Cycles
P. Adao, G. Bana, J. Herzog, A. Scedrov
 
    
Wednesday September 14, 2005
----------------------------
    
09:00 - 10:30 Session 8: Privacy and Data Protection
Privacy Preserving Clustering
S. Jha, L. Kruger, P. McDaniel
 
Abstractions Preserving Parameter Confidentiality
S. Gurgenas, P. Ochsenschlaeger, C. Rudolpah
 
Minimal Disclosure in Hierarchical Hippocratic Databases with
Delegation
F. Massacci, J. Mylopoulos, N. Zannone
 
10:30 - 11:00 Coffee break
    
11:00 - 12:30 Session 9: Security for protocols and devices
Security Notions for Disk Encryption
K. Gjosteen
 
Local View Attack on Anonymous Communication
M. Gogolewski, M. Klonowski, M. Kutylowski
 
Browser Model for Security Analysis of Browser-Based Protocols
T. Gross, B. Pfitzmann, A. Sadeghi
 
 
 
REGISTRATION
Online registration is available on the conference web page:
http://esorics05.dti.unimi.it/registration.php
 

ADDITIONAL INFORMATION
On the web pages (http://esorics05.dti.unimi.it), you will find
information about the program, the conference hotel and venue, and
some travel and tourist information. We look forward to seeing you in
Milan at ESORICS 2005.