ESORICS A

27 papers

YearTitle / Authors
1994A Calculus for Secure Channel Establishment in Open Networks.
Ueli M. Maurer, Pierre E. Schmid
1994A Consideration of the Modes of Operation for Secure Systems.
C. L. Robinson, Simon R. Wiseman
1994A Secure Medium Access Control Protocol: Security vs Performances.
Pierre Siron, Bruno d'Ausbourg
1994Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information.
Amihai Motro, Donald G. Marks, Sushil Jajodia
1994An Efficient Electronic Payment System Protecting Privacy.
Jan Camenisch, Jean-Marc Piveteau, Markus Stadler
1994Authentication via Multi-Service Tickets in the Kuperee Server.
Thomas Hardjono, Jennifer Seberry
1994Beacon Based Authentication.
Azad Jiwa, Jennifer Seberry, Yuliang Zheng
1994Compile-Time Detection of Information Flow in Sequential Programs.
Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer
1994Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings
Dieter Gollmann
1994Decomposition of Multilevel Objects in an Object-Oriented Database.
Nora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian
1994Designing Secure Key Exchange Protocols.
Colin Boyd, Wenbo Mao
1994Distributed File System over a Multilevel Secure Architecture - Problems and Solutions.
Christel Calas
1994Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem.
Bruno d'Ausbourg
1994Information Flow Controls vs Interference Controls: An Integrated Approach.
Frédéric Cuppens, Gilles Trouessin
1994Liability and Computer Security: Nine Principles.
Ross J. Anderson
1994Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems.
Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini
1994Non-Interference Through Determinism.
A. W. Roscoe, Jim Woodcock, Lars Wulf
1994Oblivious Signatures.
Lidong Chen
1994On Strengthening Authentication Protocols to Foil Cryptanalysis.
Wenbo Mao, Colin Boyd
1994On the Expressive Power of the Unary Transformation Model.
Ravi S. Sandhu, Srinivas Ganta
1994Privilege Graph: an Extension to the Typed Access Matrix Model.
Marc Dacier, Yves Deswarte
1994Robust and Secure Password and Key Change Method.
Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
1994Security Through Type Analysis.
Colin O'Halloran, Chris T. Sennett
1994Security Versus Performance Requirements in Data Communications Systems.
Vasilios Zorkadis
1994Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture.
Roshan K. Thomas, Ravi S. Sandhu
1994The ESPRIT Project CAFE - High Security Digital Payment Systems.
Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner
1994Valuation of Trust in Open Networks.
Thomas Beth, Malte Borcherding, Birgit Klein