default search action
1st ESORICS 1990: Toulouse, France
- ESORICS 90 - First European Symposium on Research in Computer Security, October 24-26, 1990, Toulouse, France. AFCET 1990
Database I
- Teresa F. Lunt, Donovan Hsieh:
The SeaView Secure Database System: A Progress Report. ESORICS 1990: 3-13 - Kioumars Yazdanian:
Relational Database Granularity. ESORICS 1990: 15-20
Database II
- Udo Kelter:
Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems. ESORICS 1990: 23-31 - Joachim Biskup:
A General Framework for Database Security. ESORICS 1990: 35-41
Secure Systems I
- R. W. Jones:
A General Mechanism for Access Control: Its Relationship to Secure System Concepts. ESORICS 1990: 45-50 - Jörg Kaiser:
An Object-Oriented Architecture to Support System Reliability and Security. ESORICS 1990: 51-60 - Zoran Savic, Mihajlo Komocar:
Security Kernel Design and Implementation in the IBM PC Environment. ESORICS 1990: 61-68
Secure Systems II
- Gerhard Hoffmann, Stephan Lechner, Matthias Leclerc, Ferdinand Steiner:
Authentication and Access Control in a Distributed System. ESORICS 1990: 71-84 - Ian F. Akyildiz, Glenn S. Benson:
A Security Reclassifier for a Local Area Network. ESORICS 1990: 85-95 - Laurent Blain, Yves Deswarte:
An Intrusion-Tolerant Security Server for an Open Distributed System. ESORICS 1990: 97-104 - E. Stewart Lee, Brian W. Thomson, Peter I. P. Boulton, Michael Stumm:
An Architecture for a Trusted Network. ESORICS 1990: 105-113
Models I
- Brian W. Thomson, E. Stewart Lee, Peter I. P. Boulton, Michael Stumm, David M. Lewis:
Using Deducibility in Secure Network Modelling. ESORICS 1990: 117-123 - Anas Tarah, Christian Huitema:
CHIMÆRA: A Network Security Model. ESORICS 1990: 127-132
Models II
- Frédéric Cuppens:
An Epistemic and Deontic Logic for Reasoning about Computer Security. ESORICS 1990: 135-145 - Colin O'Halloran:
A Calculus of Information Flow. ESORICS 1990: 147-159
Cryptography
- Dominique de Waleffe, Jean-Jacques Quisquater:
Better Login Protocols for Computer Networks. ESORICS 1990: 163-172 - Marc Girault, Jean Claude Paillès:
An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange. ESORICS 1990: 173-184 - Jacques Patarin:
Pseudorandom Permutations Based on the D.E.S. Scheme. ESORICS 1990: 185-187
Software Engineering for Security
- Ernest S. Hocking, John Alexander McDermid:
Towards an Object Oriented Development Environment for Secure Applications. ESORICS 1990: 191-200 - Gill Randell:
A Case Study in the Formal Refinement of a Distributed Secure System. ESORICS 1990: 201-208
Security Verification and Evaluation
- Pierre Bieber:
Epistemic Verification of Cryptographic Protocols. ESORICS 1990: 211-221 - Eric Deberdt, Sylvain Martin:
Methodology "Minerve Security" - Evaluation Process of Software Security. ESORICS 1990: 223-231
Invited Lecture
- D. J. Bailey:
Managing Computer Security: How Can Research Help? ESORICS 1990: 235-241 - P. Casey, A. Brouwer, D. Herson, J.-F. Pacault, F. Taal, U. Van Essen:
Harmonised Criteria for the Security Evaluation of IT Systems and Products. ESORICS 1990: 243-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.