


default search action
6th ESORICS 2000: Toulouse, France
- Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner:
Computer Security - ESORICS 2000, 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings. Lecture Notes in Computer Science 1895, Springer 2000, ISBN 3-540-41031-7
Personal Devices and Smart Cards
- Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon:
Checking Secure Interactions of Smart Card Applets. 1-16 - Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll:
Verification of a Formal Security Model for Multiapplicative Smart Cards. 17-36 - Kai Rannenberg:
How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications. 37-54
Electronic Commerce Protocols
- Els Van Herreweghen:
Secure Anonymous Signature-Based Transactions. 55-71 - Barbara Masucci, Douglas R. Stinson:
Metering Schemes for General Access Structures. 72-87
Access Control
- Gerald Brose:
A Typed Access Control Model for CORBA. 88-105 - Masakazu Soshi:
Safety Analysis of the Dynamic-Typed Access Matrix Model. 106-121 - Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce:
A Formal Model for Role-Based Access Control Using Graph Transformation. 122-139
Protocol Verification
- Jon Howell, David Kotz:
A Formal Semantics for SPKI. 140-158 - Giampaolo Bella, Fabio Massacci
, Lawrence C. Paulson
, Piero Tramontano:
Formal Verification of Cardholder Registration in SET. 159-174 - Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe:
Automating Data Independence. 175-190
Internet Security
- Kunikazu Yoda, Hiroaki Etoh:
Finding a Connection Chain for Tracing Intruders. 191-205 - Olivier Paul, Maryline Laurent
, Sylvain Gombault:
A Full Bandwidth ATM Firewall. 206-221
Security Property Analysis
- Neil Evans, Steve A. Schneider
:
Analysing Time Dependent Security Properties in CSP Using PVS. 222-237 - Heiko Mantel:
Unwinding Possibilistic Security Properties. 238-254 - Joshua D. Guttman
, Amy L. Herzog, F. Javier Thayer:
Authentication and Confidentiality via IPSEC. 255-272
Mobile Agents
- Ciarán Bryce:
A Security Framework for a Mobile Agent System. 273-290 - Refik Molva, Yves Roudier:
A Distributed Access Control Model for Java. 291-308 - Ian Welch, Robert J. Stroud:
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. 309-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.