Second ESORICS in 1992
Go back to main home page, last updated December 1994.
Import the file containing the
references of all articles
of these proceedings (in REFER format).
- Proceedings :
- Computer Security - ESORICS 92
- Second European Symposium on Research in Computer Security
- Toulouse, France, November 1992
- Y. Deswarte, G. Eizenberg, J.-J. Quisquater (Eds.)
- Lecture Notes in Computer Science, No 648
- Springer-Verlag
- ISBN 3-540-56246-X and ISBN 0-387-56246-X
Preface
The first European Symposium on Research in Computer Security took place in October 1990 in
Toulouse. The proceedings of ESORICS 90 contained 24 papers from 8 different countries and
were published by AFCET. ESORICS 92, whose proceedings are the object of these lines, is the
second symposium in what we hope will be a regular European event with a growing international
character.
ESORICS could not happen without the cooperation and support of many organizations, and this
collaboration will be a major factor in its future success. The early and continuous support
of DGA/DRET deserves a special acknowledgement.
The specificity of ESORICS is progressively affirmed, thanks to the high standard of both the
programme committee and the papers that were submitted. Authors of all proposed papers therefore
deserve the main acknowledgement, since this high quality is the key for the successful continuation
of a top-grade international symposium.
Gérard Eizenberg (Symposium Chair), Jean-Jacques Quisquater (Programme Committee Chair),
Yves Deswarte (Organization Committee Chair)
Contents of the Proceedings
- Access Control
- On the Chinese Wall Model
Volker Kessler
(abstract) - Type-Level Access Controls for Distributed Structurally Object-Oriented
Database Systems
Udo Kelter
(abstract) - Towards Security in an Open Systems Federation
John A. Bull, Li Gong, Karen R. Sollins
(abstract)
- Applications
- A Hardware Design Model for Cryptographic Algorithms
Joan Daemen, René Govaerts, Joos Vandewalle
(abstract) - ASAX: Software Architecture and Rule-Based Language for Universal Audit Trail
Analysis
Naji Habra, Baudouin Le Charlier, Isabelle Mathien, Mounji Abdelaziz
(abstract) - UEPS - A Second Generation Electronic Wallet
Ross J. Anderson
(abstract)
- Authentication I
- Verification and Modelling of Authentication Protocols
Ralf C. Hauser
(abstract) - KryptoKnight Authentication and Key Distribution System
Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti
(abstract) - Associating Metrics to Certification Paths
Anas Tarah, Christian Huitema
(abstract)
- Authentication II
- Timely Authentication in Distributed Systems
Kwok-Yan Lam, Thomas Beth
(abstract) - Freshness Assurance of Authentication Protocols
Kwok-Yan Lam, Dieter Gollmann
(abstract) - A Formal Framework for Authentication
Colin Boyd
(abstract)
- Database Security
- Security Constraint Processing in Multilevel Secure AMAC Schemata
G. Pernul
(abstract) - Polyinstantiation for Cover Stories
Ravi S. Sandhu, Sushil Jajodia
(abstract) - On Transaction Processing for Multilevel Secure Replicated Databases
I.E. Kang, T.F. Keefe
(abstract)
- Distributed Systems
- Policy Enforcement in Stub Autonomous Domains
Gene Tsudik
(abstract) - An Object-Oriented View of Fragmented Data Processing for Fault and Intrusion
Tolerance in Distributed Systems
Jean-Charles Fabre, Brian Randell
(abstract) - The Development and Testing of the Identity-based Conference Key Distribution
System for the RHODOS Distributed System
Michael Wang, Andrzej Goscinski
(abstract)
- Formal Methods
- Formal Methods and Automated Tool for Timing-Channel Identification in TCB
Source Code
Jingsha He, Virgil D. Gligor
(abstract) - Formal Specification of Security Requirements using the Theory of Normative
Positions
Andrew J. I. Jones, Marek Sergot
(abstract) - Separating the Specification and Implementation Phases in Cryptology
Marie-Jeanne Toussaint
(abstract)
- Invited Talk
- Breaking the Traditional Computer Security Research Barriers
Yvo Desmedt
(abstract)
- System Architectures
- GDoM: A Multilevel Document Manager
Christel Calas
(abstract) - M2S: A Machine for Multilevel Security
Bruno d'Ausbourg, Jean-Henri Llareus
(abstract)