ISBN: 3-540-41031-7
TITLE: Computer Security - ESORICS 2000
AUTHOR: Cuppens, Frederic; Deswarte, Yves; Gollmann, Dieter; Waidner, Michael (Eds.)
TOC:

Personal Devices and Smart Cards 
Checking Secure Interactions of Smart Card Applets 1 
P. Bieber, J. Cazin, P. Girard, J.-L. Lanet, V. Wiels, and G. Zanon 
Verification of a Formal Security Model for Multiapplicative Smart Cards 17 
Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul Karger, 
Vernon Austel, and David Toll 
How Much Negotiation and Detail Can Users Handle? Experiences with 
Security Negotiation and the Granularity of Access Control in 
Communications 37 
Kai Rannenberg 
Electronic Commerce Protocols 
Secure Anonymous Signature-Based Transactions 55 
Els van Herreweghen 
Metering Schemes for General Access Structures 72 
Barbara Masucci and Douglas R. Stinson 
Access Control 
A Typed Access Control Model for CORBA 88 
Gerald Brose 
Safety Analysis of the Dynamic-Typed Access Matrix Model 106 
Masakazu Soshi 
A Formal Model for Role-Based Access Control Using Graph Transformation 122 
Manuel Koch, Luigi V. Mancini, and Francesco Parisi-Presicce 
Protocol Verification 
A Formal Semantics for SPKI 140 
Jon Howell and David Kotz 
Formal Verification of Cardholder Registration in SET 159 
Gimpalo Bella, Fabio Massacci, Lawrence C. Paulson, and Piero Tramontano 
Automating Data Independence 175 
P. J. Broadfoot, G. Lowe, and A. W. Roscoe 
Internet Security 
Finding a Connection Chain for Tracing Intruders 191 
Kunikazu Yoda and Hiroaki Etoh 
A Full Bandwidth ATM Firewall 206 
Olivier Paul, Maryline Laurent, and Sylvian Gombault 
Security Property Analysis 
Analysing Time Dependent Security Properties in CSP Using PVS 222 
Neil Evans and Steve Schneider 
Unwinding Possibilistic Security Properties 238 
Heiko Mantel 
Authentication and Confidentiality via IPsec 255 
Joshua D. Guttman, Amy L. Herzog, and F. Javier Thayer 
Mobile Agents 
A Security Framework for a Mobile Agent System 273 
Ciarn Bryce 
A Distributed Access Control Model for Java 291 
Refik Molva and Yves Roudier 
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile 
Code 309 
Ian Welch and Robert J. Stroud 
Author Index 325 
END
