Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Amihai Motro, Donald G. Marks, Sushil Jajodia |
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ueli M. Maurer, Pierre E. Schmid |
A Calculus for Secure Channel Establishment in Open Networks. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Security transformations, Cryptography, Network security, Key management, Formal models |
1 | C. L. Robinson, Simon R. Wiseman |
A Consideration of the Modes of Operation for Secure Systems. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Security Mode of Operation, Dedicated, System High, Compartmented, System Model, Z Notation, Multi-Level |
1 | Jan Camenisch, Jean-Marc Piveteau, Markus Stadler |
An Efficient Electronic Payment System Protecting Privacy. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
privacy, cryptography, electronic payment systems |
1 | Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer |
Compile-Time Detection of Information Flow in Sequential Programs. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
formal verification, program analysis, computer security, information flow, verification tools |
1 | Pierre Siron, Bruno d'Ausbourg |
A Secure Medium Access Control Protocol: Security vs Performances. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Ralf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen |
Robust and Secure Password and Key Change Method. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Bruno d'Ausbourg |
Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystem. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Christel Calas |
Distributed File System over a Multilevel Secure Architecture - Problems and Solutions. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
M2S machine, secure LAN, Security, Distributed file system, Multilevel security |
1 | A. W. Roscoe 0001, Jim Woodcock 0001, Lars Wulf |
Non-Interference Through Determinism. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Security, Formal methods, Process algebra, Determinism, Automatic verification, Non-interference |
1 | Roshan K. Thomas, Ravi S. Sandhu |
Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated Architecture. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Replicated architecture, writeup, serial correctness, signaling channels, object-oriented databases, message-filtering |
1 | Thomas Hardjono, Jennifer Seberry |
Authentication via Multi-Service Tickets in the Kuperee Server. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini |
Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database Systems. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
object deletion, mark-and-sweep, garbage collection, mandatory access control, object-oriented database systems |
1 | Wenbo Mao, Colin Boyd |
On Strengthening Authentication Protocols to Foil Cryptanalysis. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner |
The ESPRIT Project CAFE - High Security Digital Payment Systems. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Security in Applications (Financial) - Security Versus other Requirements (Performance, Fault Tolerance) |
1 | Dieter Gollmann (eds.) |
Computer Security - ESORICS 94, Third European Symposium on Research in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
|
1 | Lidong Chen |
Oblivious Signatures. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
oblivious signatures |
1 | Colin O'Halloran, Chris T. Sennett |
Security Through Type Analysis. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
secure computer systems, Types, formal techniques, security evaluation |
1 | Thomas Beth, Malte Borcherding, Birgit Klein |
Valuation of Trust in Open Networks. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Trust values, Trust measures, Distributed systems |
1 | Ravi S. Sandhu, Srinivas Ganta |
On the Expressive Power of the Unary Transformation Model. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Access Control, Authorization, Expressive Power, Client-Server Architecture, Access Rights |
1 | Yves Deswarte, Gérard Eizenberg, Jean-Jacques Quisquater (eds.) |
Computer Security - ESORICS 92, Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Jean-Charles Fabre, Brian Randell |
An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion Tolerance in Distributed Systems. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd |
A Formal Framework for Authentication. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
security standards, formal models, Authentication protocols |
1 | Michael Wang, Andrzej M. Goscinski |
The Development and Testing of the Identity-Based Conference Key Distribution System for the RHODOS Distributed System. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Identity-based Conference Key Distribution, Distributed Systems, Authentication, Distributed Operating Systems |
1 | Joan Daemen, René Govaerts, Joos Vandewalle |
A Hardware Design Model for Cryptographic Algorithms. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Hardware Cryptography, Pseudorandom Sequence Generators, Stream Ciphers, Block Ciphers, Cryptographic Hash Functions |
1 | Jingsha He, Virgil D. Gligor |
Formal Methods and Automated Tool for Timing-Channel Identification in TCB Source Code. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Kwok-Yan Lam, Dieter Gollmann |
Freshness Assurance of Authentication Protocols. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Clock Synchronization Protocol, Network Security, Authentication Protocols, Distributed Operating Systems |
1 | Bruno d'Ausbourg, Jean-Henri Llareus |
M2S: A Machine for Multilevel Security. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Volker Kessler |
On the Chinese Wall Model. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti |
KryptoKnight Authentication and Key Distribution System. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Anas Tarah, Christian Huitema |
Associating Metrics to Certification Paths. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Marie-Jeanne Toussaint |
Separating the Specification and Implementation Phases in Cryptology. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
knowledge state, protocol execution tree, security, formal verification, cryptographic protocol, cryptology |
1 | John A. Bull, Li Gong, Karen R. Sollins |
Towards Security in an Open Systems Federation. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Günther Pernul |
Security Constraint Processing in Multilevel Secure AMAC Schemata. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Christel Calas |
GDoM: a Multilevel Document Manager. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
multilevel security (mls), mls application, mls document manager, mls Unix kernel, computer security |
1 | Ralf C. Hauser, E. Stewart Lee |
Verification and Modelling of Authentication Protocols. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Andrew J. I. Jones, Marek J. Sergot |
Formal Specification of Security Requirements using the Theory of Normative Positions. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Iwen E. Kang, Thomas F. Keefe |
On Transaction Processing for Multilevel Secure Replicated Databases. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Global Transaction Manager, Transaction Processing, Multilevel Secure, Replicated Database |
1 | Kwok-Yan Lam, Thomas Beth |
Timely Authentication in Distributed Systems. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
Authentication Protocols, Interprocess Communications, Distributed Operating Systems |
1 | Yvo Desmedt |
Breaking the Traditional Computer Security Barriers. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Gene Tsudik |
Policy Enforcement in Stub Autonomous Domains. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
inter-domain communication, data integrity, network protocols, internetworking, authentication protocols, communication security |
1 | Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu |
ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail Analysis. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Udo Kelter |
Type-Level Access Controls for Distributed Structurally Object-Oriented Database Systems. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
group-orientation, distribution, views, multiple inheritance, object-oriented database systems, access control lists, discretionary access controls |
1 | Ross J. Anderson |
UEPS - A Second Generation Electronic Wallet. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Ravi S. Sandhu, Sushil Jajodia |
Polyinstantation for Cover Stories. |
ESORICS |
1992 |
DBLP DOI BibTeX RDF |
|
1 | Dominique de Waleffe, Jean-Jacques Quisquater |
Better Login Protocols for Computer Networks. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Pierre Bieber |
Epistemic Verification of Cryptographic Protocols. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Joachim Biskup |
A General Framework for Database Security. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | E. Stewart Lee, Brian W. Thomson, Peter I. P. Boulton, Michael Stumm |
An Architecture for a Trusted Network. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Udo Kelter |
Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Teresa F. Lunt, Donovan Hsieh |
The SeaView Secure Database System: A Progress Report. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Gerhard Hoffmann, Stephan Lechner, Matthias Leclerc, Ferdinand Steiner |
Authentication and Access Control in a Distributed System. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Ian F. Akyildiz, Glenn S. Benson |
A Security Reclassifier for a Local Area Network. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Eric Deberdt, Sylvain Martin |
Methodology "Minerve Security" - Evaluation Process of Software Security. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Kioumars Yazdanian |
Relational Database Granularity. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Frédéric Cuppens |
An Epistemic and Deontic Logic for Reasoning about Computer Security. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Jörg Kaiser |
An Object-Oriented Architecture to Support System Reliability and Security. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Gill Randell |
A Case Study in the Formal Refinement of a Distributed Secure System. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Marc Girault, Jean Claude Paillès |
An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | D. J. Bailey |
Managing Computer Security: How Can Research Help? |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Colin O'Halloran |
A Calculus of Information Flow. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | |
ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Zoran Savic, Mihajlo Komocar |
Security Kernel Design and Implementation in the IBM PC Environment. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Brian W. Thomson, E. Stewart Lee, Peter I. P. Boulton, Michael Stumm, David M. Lewis |
Using Deducibility in Secure Network Modelling. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Anas Tarah, Christian Huitema |
CHIMÆRA: A Network Security Model. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | R. W. Jones |
A General Mechanism for Access Control: Its Relationship to Secure System Concepts. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Laurent Blain, Yves Deswarte |
An Intrusion-Tolerant Security Server for an Open Distributed System. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Ernest S. Hocking, John Alexander McDermid |
Towards an Object Oriented Development Environment for Secure Applications. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen |
Harmonised Criteria for the Security Evaluation of IT Systems and Products. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|
1 | Jacques Patarin |
Pseudorandom Permutations Based on the D.E.S. Scheme. |
ESORICS |
1990 |
DBLP BibTeX RDF |
|