Papers to be presented at ESORICS-96 (European Sympoisum on Research
in Computer Security), September 25-27, 1996, Rome, Italy.
Conference information.
- M. Waidner,
"Development of a Secure Electronic Marketplace for Europe"
IBM Zurich Research Lab., Zurich (Switzerland)
- W. Mao,
"A Light-Weight Micro-Cash Payment Technique for the
Internet"
Hewlett-Packard Labs., Bristol (UK)
- J. Camenisch, U. Maurer, M. Stadler,
"Digital Payment Systems with Passive Anonymity-Revoking
Trustees"
ETH Zurich, Zurich (Switzerland)
- V. Atluri, W-K. Huang,
"An Authorization Model for Workflows"
Rutgers University, Newark (NJ - USA)
- R. Sandhu,
"Role Hierarchies and Constraints for Lattice-Based Access
Controls"
George Mason University, Fairfax (VA - USA)
- Peter Landrock,
"Secure Electronic Commerce - How and when?"(Invited Speech)
Aarhus University & Cryptomathic, Aarhus Science Park, Denmark
- V. Nicomette, Y. Deswarte,
"A Multilevel Security Model for Distributed Object Systems"
LAAS-CNRS & INRIA, Toulouse (France)
- S. De Capitani di Vimercati, P. Samarati,
"An Authorization Model for Federated Systems"
University of Milan, Milan (Italy)
- W. Farmer, J. Guttman, V. Swarup,
"Security for Mobile Agents: Authentication and State
Appraisal"
The MITRE Corporation, Bedford (MA - USA)
- N. Asokan, G. Tsudik, M. Waidner,
"Server Supported Signatures"
IBM Zurich Research Lab., Zurich (Switzerland)
- S. F. Wu,
"Sleepy Network-Layer Authentication Service for IPSEC"
North Carolina State University, Raleigh (NC - USA)
- J. Zhou, D. Gollmann,
"Certified Electronic Mail"
University of London, Egham (UK)
- B. Schneier (*), J. Kelsey (*), J. Walker (**),
"Distributed Proctoring"
(*) Counterpane Systems, Minneapolis (MN - USA)
(**) Walker Digital, Stamford (CT - USA)
- P. Bonatti (*), M. L. Sapino (*), V. S. Subrahamanian (**),
"Merging Heterogeneous Security Orderings"
(*) University of Turin, Turin (Italy)
(**) University of Maryland, College Park (MD - USA)
- S. Schneider, A. Sidiropoulos,
"CSP and Anonymity"
University of London, Egham (UK)
- G. Wedel (*), V. Kessler (**),
"Formal Semantics for Authentication Logics"
(*) RWTH Aachen, Aachen (Germany)
(**) Siemens AG, Corporate Research and Development,
Munich (Germany)
- V. Lotz,
"Threat Scenarios as a Means to Formally Develop Secure
Systems"
Siemens AG, Corporate Research and Development,
Munich (Germany)
- A. Warner (*), Q. Li (*), S. Pal (**), T. Keefe (*),
"The Impact of Multilevel Security on Database Buffer
Management"
(*) The Pennsylvania State University - Pittsburg (PA - USA)
(**) Microsoft Corporation, Redmond (VA - USA)
- D.G. Marks, A. Motro, S. Jajodia,
"Controlled disclosure of sensitive information"
George Mason University, Fairfax (VA - USA)
- L. Mancini (*), I. Ray (**),
"Secure Concurrency Control in MLS Databases with Two
Versions of Data"
(*) University of Genoa, Genoa (Italy)
(**) George Mason University, Fairfax (VA - USA)
- U. Maurer,
"Modelling a Public-Key Infrastructure"
ETH Zurich, Zurich (Switzerland)
- C. Meadows,
"Analyzing the Needham-Schroeder Public-Key Protocol"
Naval Research Lab., Washington DC (USA)