Search dblp for Publications

export results for "toc:db/conf/esorics/esorics1994.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/Anderson94,
  author    = {Ross J. Anderson},
  title     = {Liability and Computer Security: Nine Principles},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {231--245},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/BanatreBM94,
  author    = {Jean{-}Pierre Ban{\^{a}}tre and
               Ciar{\'{a}}n Bryce and
               Daniel Le M{\'{e}}tayer},
  title     = {Compile-Time Detection of Information Flow in Sequential Programs},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {55--73},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/BethBK94,
  author    = {Thomas Beth and
               Malte Borcherding and
               Birgit Klein},
  title     = {Valuation of Trust in Open Networks},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {3--18},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/BolyBCMMMPPRSSVW94,
  author    = {Jean{-}Paul Boly and
               Antoon Bosselaers and
               Ronald Cramer and
               Rolf Michelsen and
               Stig Fr. Mj{\o}lsnes and
               Frank Muller and
               Torben P. Pedersen and
               Birgit Pfitzmann and
               Peter de Rooij and
               Berry Schoenmakers and
               Matthias Schunter and
               Luc Vall{\'{e}}e and
               Michael Waidner},
  title     = {The {ESPRIT} Project {CAFE} - High Security Digital Payment Systems},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {217--230},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/Boulahia-CuppensCGY94,
  author    = {Nora Boulahia{-}Cuppens and
               Fr{\'{e}}d{\'{e}}ric Cuppens and
               Alban Gabillon and
               Kioumars Yazdanian},
  title     = {Decomposition of Multilevel Objects in an Object-Oriented Database},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {375--402},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/BoydM94,
  author    = {Colin Boyd and
               Wenbo Mao},
  title     = {Designing Secure Key Exchange Protocols},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {93--105},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/Calas94,
  author    = {Christel Calas},
  title     = {Distributed File System over a Multilevel Secure Architecture - Problems
               and Solutions},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {281--297},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/CamenischPS94,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  title     = {An Efficient Electronic Payment System Protecting Privacy},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {207--215},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/Chen94,
  author    = {Lidong Chen},
  title     = {Oblivious Signatures},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {161--172},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/ChiampichettiBM94,
  author    = {Alessandro Ciampichetti and
               Elisa Bertino and
               Luigi V. Mancini},
  title     = {Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented
               Database Systems},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {359--373},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/CuppensT94,
  author    = {Fr{\'{e}}d{\'{e}}ric Cuppens and
               Gilles Trouessin},
  title     = {Information Flow Controls vs Interference Controls: An Integrated
               Approach},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {447--468},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/DacierD94,
  author    = {Marc Dacier and
               Yves Deswarte},
  title     = {Privilege Graph: an Extension to the Typed Access Matrix Model},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {319--334},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/HardjonoS94,
  author    = {Thomas Hardjono and
               Jennifer Seberry},
  title     = {Authentication via Multi-Service Tickets in the Kuperee Server},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {143--160},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/HauserJMTH94,
  author    = {Ralf C. Hauser and
               Philippe A. Janson and
               Refik Molva and
               Gene Tsudik and
               Els Van Herreweghen},
  title     = {Robust and Secure Password and Key Change Method},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {107--122},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/JiwaSZ94,
  author    = {Azad Jiwa and
               Jennifer Seberry and
               Yuliang Zheng},
  title     = {Beacon Based Authentication},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {125--141},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/MaoB94,
  author    = {Wenbo Mao and
               Colin Boyd},
  title     = {On Strengthening Authentication Protocols to Foil Cryptanalysis},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {193--204},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/MaurerS94,
  author    = {Ueli M. Maurer and
               Pierre E. Schmid},
  title     = {A Calculus for Secure Channel Establishment in Open Networks},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {175--192},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/MotroMJ94,
  author    = {Amihai Motro and
               Donald G. Marks and
               Sushil Jajodia},
  title     = {Aggregation in Relational Databases: Controlled Disclosure of Sensitive
               Information},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {431--445},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/OHalloranS94,
  author    = {Colin O'Halloran and
               Chris T. Sennett},
  title     = {Security Through Type Analysis},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {75--89},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/RobinsonW94,
  author    = {C. L. Robinson and
               Simon R. Wiseman},
  title     = {A Consideration of the Modes of Operation for Secure Systems},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {335--356},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/RoscoeWW94,
  author    = {A. W. Roscoe and
               Jim Woodcock and
               Lars Wulf},
  title     = {Non-Interference Through Determinism},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {33--53},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/SandhuG94,
  author    = {Ravi S. Sandhu and
               Srinivas Ganta},
  title     = {On the Expressive Power of the Unary Transformation Model},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {301--318},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/Sirond94,
  author    = {Pierre Siron and
               Bruno d'Ausbourg},
  title     = {A Secure Medium Access Control Protocol: Security vs Performances},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {267--279},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/ThomasS94,
  author    = {Roshan K. Thomas and
               Ravi S. Sandhu},
  title     = {Supporting Object-Based High-Assurance Write-up in Multilevel Databases
               for the Replicated Architecture},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {403--428},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/Zorkadis94,
  author    = {Vasilios Zorkadis},
  title     = {Security Versus Performance Requirements in Data Communications Systems},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {19--30},
  publisher = {Springer},
  year      = {1994}
}
@inproceedings{DBLP:conf/esorics/dAusbourg94,
  author    = {Bruno d'Ausbourg},
  title     = {Implementing Secure Dependencies over a Network by Designing a Distributed
               Security SubSystem},
  booktitle = {{ESORICS}},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {249--266},
  publisher = {Springer},
  year      = {1994}
}
@proceedings{DBLP:conf/esorics/1994,
  editor    = {Dieter Gollmann},
  title     = {Computer Security - {ESORICS} 94, Third European Symposium on Research
               in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  publisher = {Springer},
  year      = {1994}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics