default search action
4th ESORICS 1996: Rome, Italy
- Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo:
Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings. Lecture Notes in Computer Science 1146, Springer 1996, ISBN 3-540-61770-1
Session 1: Electronic Commerce
- Michael Waidner:
Development of a Secure Electronic Marketplace for Europe. 1-14 - Wenbo Mao:
Light-Weight Micro-cash Payment for the Internet. 15-32 - Jan Camenisch, Ueli M. Maurer, Markus Stadler:
Digital Payment Systems with Passive Anonymity-Revoking Trustees. 33-43
Session 2: Advanced Access Control Models for Database Systems
- Vijayalakshmi Atluri, Wei-kuang Huang:
An Authorization Model for Workflows. 44-64 - Ravi S. Sandhu:
Role Hierarchies and Constraints for Lattice-Based Access Controls. 65-79
Session 3: Distributed Systems
- Vincent Nicomette, Yves Deswarte:
A Multilevel Security Model for Distributed Object Systems. 80-98 - Sabrina De Capitani di Vimercati, Pierangela Samarati:
An Authorization Model for Federated Systems. 99-117
Session 4: Security Issues for Mobile Computing
- William M. Farmer, Joshua D. Guttman, Vipin Swarup:
Security for Mobile Agents: Authentication and State Appraisal. 118-130 - N. Asokan, Gene Tsudik, Michael Waidner:
Server-Supported Signatures. 131-143
Panel
- Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth:
Limitations of the Approach of Solving a Network's Security Problem with a Firewall. 144-145
Session 5: Network Security 1
- Shyhtsun Felix Wu:
Sleepy Network-Layer Authentication Service for IPSEC. 146-159 - Jianying Zhou, Dieter Gollmann:
Certified Electronic Mail. 160-171 - Bruce Schneier, John Kelsey, Jay Walker:
Distributed Proctoring. 172-182
Session 6: Theoretical Foundations of Security
- Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian:
Merging Heterogeneous Security Orderings. 183-197 - Steve A. Schneider, Abraham Sidiropoulos:
CSP and Anonymity. 198-218 - Gabriele Wedel, Volker Kessler:
Formal Semantics for Authentication Logics. 219-241 - Volkmar Lotz:
Threat Scenarios as a Means to Formally Develop Secure Systems. 242-265
Session 7: Secure Database Architectures
- Andrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal:
The Impact of Multilevel Security on Database Buffer Management. 266-289 - Donald G. Marks, Amihai Motro, Sushil Jajodia:
Enhancing the Controlled Disclosure of Sensitive Information. 290-303 - Luigi V. Mancini, Indrajit Ray:
Secure Concurrency Control in MLS Databases with Two Versions of Data. 304-323
Panel
- Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater:
Authors' Rights and Copyright Protection. 324
Session 8: Network Security 2
- Ueli M. Maurer:
Modelling a Public-Key Infrastructure. 325-350 - Catherine A. Meadows:
Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. 351-364
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.