


default search action
3rd ESORICS 1994: Brighton, UK
- Dieter Gollmann:
Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings. Lecture Notes in Computer Science 875, Springer 1994, ISBN 3-540-58618-0
Measures
- Thomas Beth, Malte Borcherding, Birgit Klein:
Valuation of Trust in Open Networks. 3-18 - Vasilios Zorkadis:
Security Versus Performance Requirements in Data Communications Systems. 19-30
High Assurance Software
- A. W. Roscoe, Jim Woodcock
, Lars Wulf:
Non-Interference Through Determinism. 33-53 - Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer:
Compile-Time Detection of Information Flow in Sequential Programs. 55-73 - Colin O'Halloran, Chris T. Sennett:
Security Through Type Analysis. 75-89
Key Management 1
- Colin Boyd, Wenbo Mao:
Designing Secure Key Exchange Protocols. 93-105 - Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen:
Robust and Secure Password and Key Change Method. 107-122
Authentication
- Azad Jiwa, Jennifer Seberry, Yuliang Zheng:
Beacon Based Authentication. 125-141 - Thomas Hardjono, Jennifer Seberry:
Authentication via Multi-Service Tickets in the Kuperee Server. 143-160 - Lidong Chen:
Oblivious Signatures. 161-172
Key Management 2
- Ueli M. Maurer, Pierre E. Schmid:
A Calculus for Secure Channel Establishment in Open Networks. 175-192 - Wenbo Mao, Colin Boyd:
On Strengthening Authentication Protocols to Foil Cryptanalysis. 193-204
Digital Payment
- Jan Camenisch, Jean-Marc Piveteau, Markus Stadler:
An Efficient Electronic Payment System Protecting Privacy. 207-215 - Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes
, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner:
The ESPRIT Project CAFE - High Security Digital Payment Systems. 217-230 - Ross J. Anderson:
Liability and Computer Security: Nine Principles. 231-245
Distributed Systems
- Bruno d'Ausbourg:
Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem. 249-266 - Pierre Siron
, Bruno d'Ausbourg:
A Secure Medium Access Control Protocol: Security vs Performances. 267-279 - Christel Calas:
Distributed File System over a Multilevel Secure Architecture - Problems and Solutions. 281-297
Access Controls
- Ravi S. Sandhu, Srinivas Ganta:
On the Expressive Power of the Unary Transformation Model. 301-318 - Marc Dacier, Yves Deswarte:
Privilege Graph: an Extension to the Typed Access Matrix Model. 319-334 - C. L. Robinson, Simon R. Wiseman:
A Consideration of the Modes of Operation for Secure Systems. 335-356
Database 1
- Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini:
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. 359-373 - Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian:
Decomposition of Multilevel Objects in an Object-Oriented Database. 375-402 - Roshan K. Thomas, Ravi S. Sandhu:
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. 403-428
Database 2
- Amihai Motro, Donald G. Marks, Sushil Jajodia:
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. 431-445 - Frédéric Cuppens, Gilles Trouessin:
Information Flow Controls vs Interference Controls: An Integrated Approach. 447-468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.