default search action
2nd ESORICS 1992: Toulouse, France
- Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater:
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings. Lecture Notes in Computer Science 648, Springer 1992, ISBN 3-540-56246-X
Access Control
- John A. Bull, Li Gong, Karen R. Sollins:
Towards Security in an Open Systems Federation. 3-20 - Udo Kelter:
Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems. 21-40 - Volker Kessler:
On the Chinese Wall Model. 41-54
Formal Methods
- Jingsha He, Virgil D. Gligor:
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. 57-76 - Marie-Jeanne Toussaint:
Separating the Specification and Implementation Phases in Cryptology. 77-102 - Andrew J. I. Jones, Marek J. Sergot:
Formal Specification of Security Requirements using the Theory of Normative Positions. 103-121
Invited Talk
- Yvo Desmedt:
Breaking the Traditional Computer Security Barriers. 125-138
Authentication 1
- Ralf C. Hauser, E. Stewart Lee:
Verification and Modelling of Authentication Protocols. 141-154 - Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti:
KryptoKnight Authentication and Key Distribution System. 155-174 - Anas Tarah, Christian Huitema:
Associating Metrics to Certification Paths. 175-189
Distributed Systems
- Jean-Charles Fabre, Brian Randell:
An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. 193-208 - Michael Wang, Andrzej M. Goscinski:
The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. 209-228 - Gene Tsudik:
Policy Enforcement in Stub Autonomous Domains. 229-257
Authentication 2
- Kwok-Yan Lam, Dieter Gollmann:
Freshness Assurance of Authentication Protocols. 261-272 - Colin Boyd:
A Formal Framework for Authentication. 273-292 - Kwok-Yan Lam, Thomas Beth:
Timely Authentication in Distributed Systems. 293-303
Database Security
- Ravi S. Sandhu, Sushil Jajodia:
Polyinstantation for Cover Stories. 307-328 - Iwen E. Kang, Thomas F. Keefe:
On Transaction Processing for Multilevel Secure Replicated Databases. 329-348 - Günther Pernul:
Security Constraint Processing in Multilevel Secure AMAC Schemata. 349-370
System Architectures
- Bruno d'Ausbourg, Jean-Henri Llareus:
M2S: A Machine for Multilevel Security. 373-392 - Christel Calas:
GDoM: a Multilevel Document Manager. 393-408
Applications
- Ross J. Anderson:
UEPS - A Second Generation Electronic Wallet. 411-418 - Joan Daemen, René Govaerts, Joos Vandewalle:
A Hardware Design Model for Cryptographic Algorithms. 419-434 - Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu:
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. 435-450
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.