LEADER 05629nam 22007335 450 001 996465392703316 005 20200703230650.0 010 $a3-540-45853-0 024 7 $a10.1007/3-540-45853-0 035 $a(CKB)1000000000211812 035 $a(SSID)ssj0000322135 035 $a(PQKBManifestationID)11231384 035 $a(PQKBTitleCode)TC0000322135 035 $a(PQKBWorkID)10281488 035 $a(PQKB)11557036 035 $a(DE-He213)978-3-540-45853-1 035 $a(MiAaPQ)EBC3072414 035 $a(PPN)155186353 035 $a(EXLCZ)991000000000211812 100 $a20121227d2002 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security -- ESORICS 2002$b[electronic resource] $e7th European Symposium on Research in Computer Security Zurich, Switzerland, October 14-16, 2002, Proceedings /$fedited by Dieter Gollmann, Günter Karjoth, Michael Waidner 205 $a1st ed. 2002. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2002. 215 $a1 online resource (CCCVIII, 298 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v2502 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-44345-2 320 $aIncludes bibliographical references and index. 327 $aComputational Probabilistic Non-interference -- Bit-Slice Auction Circuit -- Confidentiality Policies and Their Enforcement for Controlled Query Evaluation -- Cardinality-Based Inference Control in Sum-Only Data Cubes -- Outbound Authentication for Programmable Secure Coprocessors -- Hamming Weight Attacks on Cryptographic Hardware ? Breaking Masking Defense -- A Fully Compliant Research Implementation of the P3P Standard for Privacy Protection: Experiences and Recommendations -- Authentication for Distributed Web Caches -- Analysing a Stream Authentication Protocol Using Model Checking -- Equal To The Task? -- TINMAN: A Resource Bound Security Checking System for Mobile Code -- Confidentiality-Preserving Refinement is Compositional ? Sometimes -- Formal Security Analysis with Interacting State Machines -- Decidability of Safety in Graph-Based Models for Access Control -- Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones -- Learning Fingerprints for a Database Intrusion Detection System. 330 $aESORICS, the European Symposium on Research in Computer Security, is the leading research-oriented conference on the theory and practice of computer security in Europe. It takes place every two years, at various locations throughout Europe, and is coordinated by an independent Steering Committee. ESORICS 2002 was jointly organized by the Swiss Federal Institute of Te- nology (ETH) and the IBM Zurich Research Laboratory, and took place in Zurich, Switzerland, October 14-16, 2002. The program committee received 83 submissions, originating from 22 co- tries. For fans of statistics: 55 submissions came from countries in Europe, the Middle East, or Africa, 16 came from Asia, and 12from North America. The leading countries were USA (11 submissions), Germany (9), France (7), Italy (7), Japan (6), and UK (6). Each submission was reviewed by at least three p- gram committee members or other experts. Each submission coauthored by a program committee member received two additional reviews. The program c- mittee chair and cochair were not allowed to submit papers. The ?nal selection of papers was made at a program committee meeting and resulted in 16 accepted papers. In comparison, ESORICS 2000 received 75 submissions and accepted 19 of them. The program re?ects the full range of security research: we accepted papers on access control, authentication, cryptography, database security, formal methods, intrusion detection, mobile code security, privacy, secure hardware, and secure protocols. We gratefully acknowledge all authors who submitted papers for their e?orts in maintaining the standards of this conference. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v2502 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aComputer communication systems 606 $aDatabase management 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aDatabase Management$3https://scigraph.springernature.com/ontologies/product-market-codes/I18024 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aComputer communication systems. 615 0$aDatabase management. 615 14$aCryptology. 615 24$aOperating Systems. 615 24$aComputer Communication Networks. 615 24$aDatabase Management. 676 $a005.8 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKarjoth$b Günter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWaidner$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Symposium on Research in Computer Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996465392703316 996 $aComputer Security -- ESORICS 2002$92204555 997 $aUNISA