ESORICS A

25 papers

YearTitle / Authors
1990A Calculus of Information Flow.
Colin O'Halloran
1990A Case Study in the Formal Refinement of a Distributed Secure System.
Gill Randell
1990A General Framework for Database Security.
Joachim Biskup
1990A General Mechanism for Access Control: Its Relationship to Secure System Concepts.
R. W. Jones
1990A Security Reclassifier for a Local Area Network.
Ian F. Akyildiz, Glenn S. Benson
1990An Architecture for a Trusted Network.
E. Stewart Lee, Brian W. Thomson, Peter I. P. Boulton, Michael Stumm
1990An Epistemic and Deontic Logic for Reasoning about Computer Security.
Frédéric Cuppens
1990An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange.
Marc Girault, Jean Claude Paillès
1990An Intrusion-Tolerant Security Server for an Open Distributed System.
Laurent Blain, Yves Deswarte
1990An Object-Oriented Architecture to Support System Reliability and Security.
Jörg Kaiser
1990Authentication and Access Control in a Distributed System.
Gerhard Hoffmann, Stephan Lechner, Matthias Leclerc, Ferdinand Steiner
1990Better Login Protocols for Computer Networks.
Dominique de Waleffe, Jean-Jacques Quisquater
1990CHIMÆRA: A Network Security Model.
Anas Tarah, Christian Huitema
1990ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France
1990Epistemic Verification of Cryptographic Protocols.
Pierre Bieber
1990Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems.
Udo Kelter
1990Harmonised Criteria for the Security Evaluation of IT Systems and Products.
P. Casey, A. Brouwer, David Herson, J.-F. Pacault, F. Taal, U. Van Essen
1990Managing Computer Security: How Can Research Help?
D. J. Bailey
1990Methodology "Minerve Security" - Evaluation Process of Software Security.
Eric Deberdt, Sylvain Martin
1990Pseudorandom Permutations Based on the D.E.S. Scheme.
Jacques Patarin
1990Relational Database Granularity.
Kioumars Yazdanian
1990Security Kernel Design and Implementation in the IBM PC Environment.
Zoran Savic, Mihajlo Komocar
1990The SeaView Secure Database System: A Progress Report.
Teresa F. Lunt, Donovan Hsieh
1990Towards an Object Oriented Development Environment for Secure Applications.
Ernest S. Hocking, John Alexander McDermid
1990Using Deducibility in Secure Network Modelling.
Brian W. Thomson, E. Stewart Lee, Peter I. P. Boulton, Michael Stumm, David M. Lewis