ESORICS A

24 papers

YearTitle / Authors
1996A Multilevel Security Model for Distributed Object Systems.
Vincent Nicomette, Yves Deswarte
1996An Authorization Model for Federated Systems.
Sabrina De Capitani di Vimercati, Pierangela Samarati
1996An Authorization Model for Workflows.
Vijayalakshmi Atluri, Wei-kuang Huang
1996Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches.
Catherine A. Meadows
1996Authors' Rights and Copyright Protection.
Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater
1996CSP and Anonymity.
Steve A. Schneider, Abraham Sidiropoulos
1996Certified Electronic Mail.
Jianying Zhou, Dieter Gollmann
1996Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings
Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo
1996Development of a Secure Electronic Marketplace for Europe.
Michael Waidner
1996Digital Payment Systems with Passive Anonymity-Revoking Trustees.
Jan Camenisch, Ueli M. Maurer, Markus Stadler
1996Distributed Proctoring.
Bruce Schneier, John Kelsey, Jay Walker
1996Enhancing the Controlled Disclosure of Sensitive Information.
Donald G. Marks, Amihai Motro, Sushil Jajodia
1996Formal Semantics for Authentication Logics.
Gabriele Wedel, Volker Kessler
1996Light-Weight Micro-cash Payment for the Internet.
Wenbo Mao
1996Limitations of the Approach of Solving a Network's Security Problem with a Firewall.
Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth
1996Merging Heterogeneous Security Orderings.
Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian
1996Modelling a Public-Key Infrastructure.
Ueli M. Maurer
1996Role Hierarchies and Constraints for Lattice-Based Access Controls.
Ravi S. Sandhu
1996Secure Concurrency Control in MLS Databases with Two Versions of Data.
Luigi V. Mancini, Indrajit Ray
1996Security for Mobile Agents: Authentication and State Appraisal.
William M. Farmer, Joshua D. Guttman, Vipin Swarup
1996Server-Supported Signatures.
N. Asokan, Gene Tsudik, Michael Waidner
1996Sleepy Network-Layer Authentication Service for IPSEC.
Shyhtsun Felix Wu
1996The Impact of Multilevel Security on Database Buffer Management.
Andrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal
1996Threat Scenarios as a Means to Formally Develop Secure Systems.
Volkmar Lotz