ESORICS
ESORICS 2004 Home Page   Call for Papers Sponsor Information Submission Information Program Information Registration Information Conference Committee General Information

Technical Program

Monday, September 13th
09:15 - 09:30Opening remarks
 
09:30 - 10:30Invited talk: Cryptographic Security of Reactive Systems - Linking Cryptography and Formal Methods
Michael Waidner
IBM Zurich Research Laboratory, Switzerland
 
10:30 - 11:00coffee break
 
11:00 - 12:30Access control
 
Incorporating Dynamic Constraints in the Flexible Authorization Framework
Shiping Chen, Duminda Wijesekera, Sushil Jajodia
 
Access-Condition-Table-driven Access Control for XML Database
Naizhen Qi, Michiharu Kudo
 
An Algebra for Composing Enterprise Privacy Policies
Michael Backes, Markus Duermuth, Rainer Steinwandt
 
12:30 - 14:00lunch
 
14:00 - 15:30Cryptographic protocols
 
Deriving, attacking and defending the GDOI protocol
Catherine Meadows, Dusko Pavlovic
 
Better Privacy for Trusted Computing Platforms
Jan Camenisch
 
A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol
Michael Backes
 
15:30 - 16:00coffee break
 
16:00 - 17:30Anonymity and information hiding
 
A Formalization of Anonymity and Onion Routing
Sjouke Mauw, Jan Verschuren, Erik de Vink
 
Breaking Cauchy Model-based JPEG Steganography with First Order Statistics
Rainer Böhme, Andreas Westfeld
 
Comparison between two practical mix designs
Claudia Diaz, Len Sassaman, Evelyne Dewitte
 
18:30 - Reception - Mediathel
 
Tuesday, September 14th
09:00 - 10:30Distributed data protection
 
Signature Bouquets: Immutability for Aggregated/Condensed Signatures
Einar Mykletun, Maithili Narasimha, Gene Tsudik
 
Towards a theory of data entanglement
James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong
 
Portable and Flexible Document Access Control Mechanisms
Mikhail Atallah, Marina Bykova
 
10:30 - 11:00coffee break
 
11:00 - 12:30Information flow and security properties
 
Possibilistic Information Flow Control in the Presence of Encrypted Communication
Dieter Hutter, Axel Schairer
 
Information flow control revisited: Noninfluence = Noninterference + Nonleakage
David von Oheimb
 
Security Property Based Administrative Controls
Jon A. Solworth, Robert H. Sloan
 
12:30 - 14:00lunch
 
14:00 - 15:30Authentication and trust management
 
A Vector Model of Trust for Developing Trustworthy Systems
Indrajit Ray, Sudip Chakraborty
 
Parameterized Authentication
Michael J. Covington, Mustaque Ahamad, Irfan Essa, H. Venkateswaran
 
Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks
Bulent Yener, Seyit A. Camtepe
 
15:30 - 16:00coffee break
 
16:00 - 17:30Cryptography
 
IPv6 Opportunistic Encryption
Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann
 
On the role of key schedules in attacks on iterated ciphers
Lars R. Knudsen, John E. Mathiassen
 
A Public-Key Encryption Scheme with Pseudo-Random Ciphertexts
Bodo Möller
 
20:00 - Banquet - Restaurant Plage Keller - Antibes
 
Wednesday, September 15th
09:00 - 10:30Operating systems and architecture
 
A Host Intrusion Prevention System for Windows Operating Systems
Roberto Battistoni, Emanuele Gabrielli, Luigi Vincenzo Mancini
 
Re-establishing Trust in Compromised Systems: Recovering from Rootkits that Trojan the System Call Table
Julian Grizzard, John Levine, Henry Owen
 
ARCHERR: Runtime Environment Driven Program Safety
Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu Upadhyaya
 
10:30 - 11:00coffee break
 
11:00 - 12:30Intrusion detection
 
Sets, Bags, and Rock and Roll Analyzing Large Data Sets of Network Data
John McHugh
 
Redundancy and diversity in security
Bev Littlewood, Lorenzo Strigini
 
Discovering Novel Attack Strategies from INFOSEC Alerts
Xinzhou Qin, Wenke Lee
 

For any question, please contact the program chairs: esorics04@dti.unimi.it