Search dblp for Publications

export results for "toc:db/conf/esorics/esorics2004.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/AspnesFYZ04,
  author       = {James Aspnes and
                  Joan Feigenbaum and
                  Aleksandr Yampolskiy and
                  Sheng Zhong},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Towards a Theory of Data Entanglement: (Extended Abstract)},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {177--192},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_11},
  doi          = {10.1007/978-3-540-30108-0\_11},
  timestamp    = {Wed, 02 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/AspnesFYZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/AtallahB04,
  author       = {Mikhail J. Atallah and
                  Marina Bykova},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Portable and Flexible Document Access Control Mechanisms},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_12},
  doi          = {10.1007/978-3-540-30108-0\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/AtallahB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Backes04,
  author       = {Michael Backes},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees
                  Protocol},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_6},
  doi          = {10.1007/978-3-540-30108-0\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Backes04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BackesDS04,
  author       = {Michael Backes and
                  Markus D{\"{u}}rmuth and
                  Rainer Steinwandt},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {An Algebra for Composing Enterprise Privacy Policies},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {33--52},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_3},
  doi          = {10.1007/978-3-540-30108-0\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BackesDS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BattistoniGM04,
  author       = {Roberto Battistoni and
                  Emanuele Gabrielli and
                  Luigi V. Mancini},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {A Host Intrusion Prevention System for Windows Operating Systems},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {352--368},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_22},
  doi          = {10.1007/978-3-540-30108-0\_22},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BattistoniGM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BohmeW04,
  author       = {Rainer B{\"{o}}hme and
                  Andreas Westfeld},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Breaking Cauchy Model-Based {JPEG} Steganography with First Order
                  Statistics},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {125--140},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_8},
  doi          = {10.1007/978-3-540-30108-0\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BohmeW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Camenisch04,
  author       = {Jan Camenisch},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Better Privacy for Trusted Computing Platforms: (Extended Abstract)},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {73--88},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_5},
  doi          = {10.1007/978-3-540-30108-0\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Camenisch04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamtepeY04,
  author       = {Seyit Ahmet {\c{C}}amtepe and
                  B{\"{u}}lent Yener},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor
                  Networks},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_18},
  doi          = {10.1007/978-3-540-30108-0\_18},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CamtepeY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CastellucciaMLN04,
  author       = {Claude Castelluccia and
                  Gabriel Montenegro and
                  Julien Laganier and
                  Christoph Neumann},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Hindering Eavesdropping via IPv6 Opportunistic Encryption},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {309--321},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_19},
  doi          = {10.1007/978-3-540-30108-0\_19},
  timestamp    = {Sun, 25 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CastellucciaMLN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChenWJ04,
  author       = {Shiping Chen and
                  Duminda Wijesekera and
                  Sushil Jajodia},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Incorporating Dynamic Constraints in the Flexible Authorization Framework},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_1},
  doi          = {10.1007/978-3-540-30108-0\_1},
  timestamp    = {Wed, 20 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/ChenWJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/ChinchaniIJU04,
  author       = {Ramkumar Chinchani and
                  Anusha Iyer and
                  Bharat Jayaraman and
                  Shambhu J. Upadhyaya},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {{ARCHERR:} Runtime Environment Driven Program Safety},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {385--406},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_24},
  doi          = {10.1007/978-3-540-30108-0\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/ChinchaniIJU04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CovingtonAEV04,
  author       = {Michael J. Covington and
                  Mustaque Ahamad and
                  Irfan A. Essa and
                  H. Venkateswaran},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Parameterized Authentication},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {276--292},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_17},
  doi          = {10.1007/978-3-540-30108-0\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/CovingtonAEV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/DiazSD04,
  author       = {Claudia D{\'{\i}}az and
                  Len Sassaman and
                  Evelyne Dewitte},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Comparison Between Two Practical Mix Designs},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {141--159},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_9},
  doi          = {10.1007/978-3-540-30108-0\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/DiazSD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GrizzardLO04,
  author       = {Julian B. Grizzard and
                  John G. Levine and
                  Henry L. Owen},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Re-establishing Trust in Compromised Systems: Recovering from Rootkits
                  That Trojan the System Call Table},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {369--384},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_23},
  doi          = {10.1007/978-3-540-30108-0\_23},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GrizzardLO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HutterS04,
  author       = {Dieter Hutter and
                  Axel Schairer},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Possibilistic Information Flow Control in the Presence of Encrypted
                  Communication},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {209--224},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_13},
  doi          = {10.1007/978-3-540-30108-0\_13},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HutterS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KnudsenM04,
  author       = {Lars R. Knudsen and
                  John Erik Mathiassen},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {On the Role of Key Schedules in Attacks on Iterated Ciphers},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {322--334},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_20},
  doi          = {10.1007/978-3-540-30108-0\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KnudsenM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LittlewoodS04,
  author       = {Bev Littlewood and
                  Lorenzo Strigini},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Redundancy and Diversity in Security},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {423--438},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_26},
  doi          = {10.1007/978-3-540-30108-0\_26},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LittlewoodS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MauwVV04,
  author       = {Sjouke Mauw and
                  Jan Verschuren and
                  Erik P. de Vink},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {A Formalization of Anonymity and Onion Routing},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {109--124},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_7},
  doi          = {10.1007/978-3-540-30108-0\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MauwVV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/McHugh04,
  author       = {John McHugh},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network
                  Data},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {407--422},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_25},
  doi          = {10.1007/978-3-540-30108-0\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/McHugh04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MeadowsP04,
  author       = {Catherine Meadows and
                  Dusko Pavlovic},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Deriving, Attacking and Defending the {GDOI} Protocol},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {53--72},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_4},
  doi          = {10.1007/978-3-540-30108-0\_4},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MeadowsP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Moller04,
  author       = {Bodo M{\"{o}}ller},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {A Public-Key Encryption Scheme with Pseudo-random Ciphertexts},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {335--351},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_21},
  doi          = {10.1007/978-3-540-30108-0\_21},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Moller04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MykletunNT04,
  author       = {Einar Mykletun and
                  Maithili Narasimha and
                  Gene Tsudik},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Signature Bouquets: Immutability for Aggregated/Condensed Signatures},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {160--176},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_10},
  doi          = {10.1007/978-3-540-30108-0\_10},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MykletunNT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Oheimb04,
  author       = {David von Oheimb},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Information Flow Control Revisited: Noninfluence = Noninterference
                  + Nonleakage},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {225--243},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_14},
  doi          = {10.1007/978-3-540-30108-0\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Oheimb04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/QiK04,
  author       = {Naizhen Qi and
                  Michiharu Kudo},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Access-Condition-Table-Driven Access Control for {XML} Databases},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {17--32},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_2},
  doi          = {10.1007/978-3-540-30108-0\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/QiK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/QinL04,
  author       = {Xinzhou Qin and
                  Wenke Lee},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Discovering Novel Attack Strategies from {INFOSEC} Alerts},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {439--456},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_27},
  doi          = {10.1007/978-3-540-30108-0\_27},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/QinL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/RayC04,
  author       = {Indrajit Ray and
                  Sudip Chakraborty},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {A Vector Model of Trust for Developing Trustworthy Systems},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {260--275},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_16},
  doi          = {10.1007/978-3-540-30108-0\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/RayC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SolworthS04,
  author       = {Jon A. Solworth and
                  Robert H. Sloan},
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Security Property Based Administrative Controls},
  booktitle    = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  pages        = {244--259},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30108-0\_15},
  doi          = {10.1007/978-3-540-30108-0\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SolworthS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2004,
  editor       = {Pierangela Samarati and
                  Peter Y. A. Ryan and
                  Dieter Gollmann and
                  Refik Molva},
  title        = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
                  Computer Security, Sophia Antipolis, France, September 13-15, 2004,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3193},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b100085},
  doi          = {10.1007/B100085},
  isbn         = {3-540-22987-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics