ESORICS A

25 papers

YearTitle / Authors
1992A Formal Framework for Authentication.
Colin Boyd
1992A Hardware Design Model for Cryptographic Algorithms.
Joan Daemen, René Govaerts, Joos Vandewalle
1992ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis.
Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu
1992An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems.
Jean-Charles Fabre, Brian Randell
1992Associating Metrics to Certification Paths.
Anas Tarah, Christian Huitema
1992Breaking the Traditional Computer Security Barriers.
Yvo Desmedt
1992Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings
Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater
1992Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code.
Jingsha He, Virgil D. Gligor
1992Formal Specification of Security Requirements using the Theory of Normative Positions.
Andrew J. I. Jones, Marek J. Sergot
1992Freshness Assurance of Authentication Protocols.
Kwok-Yan Lam, Dieter Gollmann
1992GDoM: a Multilevel Document Manager.
Christel Calas
1992KryptoKnight Authentication and Key Distribution System.
Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti
1992M
Bruno d'Ausbourg, Jean-Henri Llareus
1992On Transaction Processing for Multilevel Secure Replicated Databases.
Iwen E. Kang, Thomas F. Keefe
1992On the Chinese Wall Model.
Volker Kessler
1992Policy Enforcement in Stub Autonomous Domains.
Gene Tsudik
1992Polyinstantation for Cover Stories.
Ravi S. Sandhu, Sushil Jajodia
1992Security Constraint Processing in Multilevel Secure AMAC Schemata.
Günther Pernul
1992Separating the Specification and Implementation Phases in Cryptology.
Marie-Jeanne Toussaint
1992The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System.
Michael Wang, Andrzej M. Goscinski
1992Timely Authentication in Distributed Systems.
Kwok-Yan Lam, Thomas Beth
1992Towards Security in an Open Systems Federation.
John A. Bull, Li Gong, Karen R. Sollins
1992Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems.
Udo Kelter
1992UEPS - A Second Generation Electronic Wallet.
Ross J. Anderson
1992Verification and Modelling of Authentication Protocols.
Ralf C. Hauser, E. Stewart Lee