Accepted Papers

  • A Formal Framework For Confidentiality-Preserving Refinement
    • Thomas Santen
  • A Formal Model of Access Control for Mobile Interactive Devices
    • Frédéric Besson, Guillaume Dufay and Thomas Jensen
  • A Linear Logic of Authorization and Knowledge
    • Deepak Garg, Lujo Bauer, Kevin Bowers, Frank Pfenning and Mike Reiter
  • Analysis of Policy Anomalies on Distributed Network Security Setups
    • Joaquin Garcia-Alfaro, Frederic Cuppens and Nora Cuppens-Boulahia
  • Applying a Security Requirements Engineering Process
    • Daniel Mellado, Eduardo Fernández-Medina and Mario Piattini
  • Assessment of a Vulnerability in Iterative Servers Enabling Low-rate DoS Attacks
    • Gabriel Maciá-Fernández, Jesús E. Díaz-Verdejo and Pedro García-Teodoro
  • Bridging the Gap between Inter-Communication Boundary and Inside Trusted Components
    • Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo and Hiroshi Maruyama
  • Conditional Reactive Simulatability
    • Michael Backes, Markus Duermuth, Dennis Hofheinz and Ralf Kuesters
  • Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos
    • Michael Backes, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov and Joe-Kai Tsay
  • Delegation in Role-Based Access Control
    • Jason Crampton and Hemanth Khambhammettu
  • Deriving secrecy in key establishment protocols
    • Dusko Pavlovic and Catherine Meadows
  • Discretionary Capability Confinement
    • Philip Fong
  • Enhanced Security Architecture for Music Distribution on Mobile
    • Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud and Michel Milhau
  • From coupling relations to mated invariants for checking information flow (extended abstract)
    • David Naumann
  • HBAC: A Model for History-based Access Control and Its Model Checking
    • Jing Wang, Yoshiaki Takata and Hiroyuki Seki
  • Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems
    • Mudhakar Srivatsa and Ling Liu
  • License Transfer in OMA-DRM
    • Cheun Ngen Chong, Sorin Iacob, Paul Koster, Javier Montaner and Rene van Buuren
  • Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes
    • Michael Backes, Birgit Pfitzmann and Michael Waidner
  • Minimal Threshold Closure
    • Kwok-Yan Lam, Xibin Zhao and Guimin Luo
  • Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
    • Hai Wang and Peng Liu
  • Policy-Driven Memory Protection for Reconfigurable Hardware
    • Ted Huffmire, Shreyas Prasad, Tim Sherwood and Ryan Kastner
  • Prêt à Voter with re-encryption mixes
    • Peter P.Y.A Ryan and Steve A. Schneider
  • Privacy-Preserving Queries on Encrypted Data
    • Zhiqiang Yang, Sheng Zhong and Rebecca Wright
  • Private Information Retrieval Using Trusted Hardware
    • Shuhong Wang, Xuhua Ding, Robert Deng and Feng Bao
  • Reducing the Dependence of SPKI/SDSI on PKI
    • Hao Wang, Somesh Jha, Thomas Reps, Stefan Schwoon and Stuart Stubblebine
  • Secure Key-Updating for Lazy Revocation
    • Michael Backes, Christian Cachin and Alina Oprea
  • SessionSafe: Implementing XSS Immune Session Handling
    • Martin Johns
  • Timing analysis in low-latency mix networks: attacks and defenses
    • Ming-Hsiu Wang and Vitaly Shmatikov
  • Timing-Sensitive Information Flow Analysis for Synchronous Systems
    • Boris Koepf and David Basin
  • Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
    • Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee and Boris Skoric
  • TrustedPals: Secure Multiparty Computation Implemented with SmartCards
    • Milan Fort, Felix Freiling, Lucia Draque Penso, Zinaida Benenson and Dogan Kesdogan
  • Using Service Behavior To Detect Masquerading Traffic
    • Michael Collins and Michael Reiter

Important Dates

Download the ESORICS 2006 list of events as iCal-format file ready to include into your iCal or Sunbird calendar:

Head over to the Important Dates page for details:

Important Dates »

RAID 2006

ESORICS 2006 will be directly followed by RAID 2006.

RAID 2006 homepage