ESORICS 2004 Home Page   Call for Papers Sponsor Information Submission Information Program Information Registration Information Conference Committee General Information

Technical Program

Monday, September 13th
09:15 - 09:30Opening remarks
09:30 - 10:30Invited talk: Cryptographic Security of Reactive Systems - Linking Cryptography and Formal Methods
Michael Waidner
IBM Zurich Research Laboratory, Switzerland
10:30 - 11:00coffee break
11:00 - 12:30Access control
Incorporating Dynamic Constraints in the Flexible Authorization Framework
Shiping Chen, Duminda Wijesekera, Sushil Jajodia
Access-Condition-Table-driven Access Control for XML Database
Naizhen Qi, Michiharu Kudo
An Algebra for Composing Enterprise Privacy Policies
Michael Backes, Markus Duermuth, Rainer Steinwandt
12:30 - 14:00lunch
14:00 - 15:30Cryptographic protocols
Deriving, attacking and defending the GDOI protocol
Catherine Meadows, Dusko Pavlovic
Better Privacy for Trusted Computing Platforms
Jan Camenisch
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
Michael Backes
15:30 - 16:00coffee break
16:00 - 17:30Anonymity and information hiding
A Formalization of Anonymity and Onion Routing
Sjouke Mauw, Jan Verschuren, Erik de Vink
Breaking Cauchy Model-based JPEG Steganography with First Order Statistics
Rainer Böhme, Andreas Westfeld
Comparison between two practical mix designs
Claudia Diaz, Len Sassaman, Evelyne Dewitte
18:30 - Reception - Mediathel
Tuesday, September 14th
09:00 - 10:30Distributed data protection
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Einar Mykletun, Maithili Narasimha, Gene Tsudik
Towards a theory of data entanglement
James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
Portable and Flexible Document Access Control Mechanisms
Mikhail Atallah, Marina Bykova
10:30 - 11:00coffee break
11:00 - 12:30Information flow and security properties
Possibilistic Information Flow Control in the Presence of Encrypted Communication
Dieter Hutter, Axel Schairer
Information flow control revisited: Noninfluence = Noninterference + Nonleakage
David von Oheimb
Security Property Based Administrative Controls
Jon A. Solworth, Robert H. Sloan
12:30 - 14:00lunch
14:00 - 15:30Authentication and trust management
A Vector Model of Trust for Developing Trustworthy Systems
Indrajit Ray, Sudip Chakraborty
Parameterized Authentication
Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Bulent Yener, Seyit A. Camtepe
15:30 - 16:00coffee break
16:00 - 17:30Cryptography
IPv6 Opportunistic Encryption
Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
On the role of key schedules in attacks on iterated ciphers
Lars R. Knudsen, John E. Mathiassen
A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
Bodo Möller
20:00 - Banquet - Restaurant Plage Keller - Antibes
Wednesday, September 15th
09:00 - 10:30Operating systems and architecture
A Host Intrusion Prevention System for Windows Operating Systems
Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini
Re-establishing Trust in Compromised Systems: Recovering from Rootkits that Trojan the System Call Table
Julian Grizzard, John Levine, Henry Owen
ARCHERR: Runtime Environment Driven Program Safety
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya
10:30 - 11:00coffee break
11:00 - 12:30Intrusion detection
Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data
John McHugh
Redundancy and diversity in security
Bev Littlewood, Lorenzo Strigini
Discovering Novel Attack Strategies from INFOSEC Alerts
Xinzhou Qin, Wenke Lee

For any question, please contact the program chairs: