Third ESORICS in 1994
Miscellaneous
Go back to main home page, last updated December 1994.
Import the file containing the
references of all articles
of these proceedings (in REFER format).
- Proceedings :
- Computer Security - ESORICS 94
- Third European Symposium on Research in Computer Security
- Brighton, United Kingdom, November 1994
- Dieter Gollmann (Ed.)
- Lecture Notes in Computer Science, No 875
- Springer-Verlag
- ISBN 3-540-58618-0
Programme Chair's Preface
Twenty-six paper were selected for the European Symposium on Research in
Computer Security, ESORICS'94, held November 7-9, 1994 in Brighton, UK.
That year's symposium was the third in the ESORICS series created in 1990
and renewed in 1992 by AFCET in France. The IMA organised ESORICS'94 in
co-operation with AFECT, BCS Computer Security Specialist Group, CERT-ONERA,
AICA and GI.
Progressively organised in a series of European countries, the symposium
is confirmed as the European research event in Computer Security. The
seventy-one submitted papers came from the five continents. Considering
the high average quality of the submissions, the programme committee
decided to select many of them, which led to a dense programme. The papers
were grouped in sessions devoted to high security assurance software, key
management, authentication, digital payment, distributed systems, access
controls, databases and measures. As the the evaluation of security was
not sufficiently addressed in the submitted research papers, the programme
committee organised a panel session devoted to it. In addition, to amplify
the contribution to the symposium of the digital payment topic, it invited
Professor Henry Beker to talk about "Security Research for the Financial
Sector".
The authors of all submitted papers deserve the main acknowledgment. The
successful continuation of a top-grade international symposium depends on
them. The efficiency of the programme committee members made possible a
timely review of quality. The signatories thank Professor Roger Needham for
his help in the global review process they had to perform.
Gerard Eizenberg (Programme Chair), Eliza Bertino (Programme Vice-Chair)
Contents of the Proceedings
- Access Controls
- Privilege Graph: an Extension to the Typed Access Matrix Model
Marc Dacier, Yves Deswarte
(abstract) - On the Expressive Power of the Unary Transformation Model
Ravi S. Sandhu, Srinivas Ganta
(abstract) - A Consideration of the Modes of Operation for Secure Systems
C. L. Robinson, S. R. Wiseman
(abstract)
- Authentication
- Authentication via Multi-Service Tickets in the Kuperee Server
Thomas Hardjono, Jennifer Seberry
(abstract) - Oblivious Signatures
Lidong Chen
(abstract) - Beacon Based Authentication
Azad Jiwa, Jennifer Seberry, Yuliang Zheng
(abstract)
- Database I
- Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented
Database Systems
Alessandro Ciampichetti, Elisa Bertino, Luigi Mancini
(abstract) - Decomposition of Multilevel Objects in an Object-Oriented Database
N. Boulahia-Cuppens, F. Cuppens, A. Gabillon, K. Yazdanian
(abstract) - Supporting Object-based High-assurance Write-up in Multilevel Databases for
the Replicated Architecture
Roshan K. Thomas, Ravi S. Sandhu
(abstract)
- Database II
- Aggregation in Relational Databases: Controlled Disclosure of Sensitive
Information
Amihai Motro, Donald G. Marks, Sushil Jajodia
(abstract) - Information Flow Controls vs Inference Controls: An Integrated Approach
F. Cuppens, G. Trouessin
(abstract)
- Digital Payment
- The ESPRIT Project CAFE - High Security Digital Payment Systems -
Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller, Torben Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner
(abstract) - An Efficient Electronic Payment System Protecting Privacy
Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler
(abstract) - Liability and Computer Security: Nine Principles
Ross J. Anderson
(abstract)
- Distributed Systems
- Distributed File System over a Multilevel Secure Architecture Problems and
Solutions
Christel Calas
(abstract) - A Secure Medium Access Control Protocol: Security versus Performances
Pierre Siron, Bruno d'Ausbourg
(abstract) - Implementing Secure Dependencies over a Network by Designing a Distributed
Security SubSystem
Bruno d'Ausbourg
(abstract)
- High Assurance Software
- Compile-time Detection of Information Flow in Sequential Programs
Jean-Pierre Banâtre, Ciaran Bryce, Daniel Le Métayer
(abstract) - Non-interference through Determinism
A.W. Roscoe, J.C.P. Woodcock, L. Wulf
(abstract) - Security through Type Analysis
C. O'Halloran, C. T. Sennett
(abstract)
- Key Management I
- Robust and Secure Password and Key Change Method
Ralf Hauser, Philippe Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
(abstract) - Designing Secure Key Exchange Protocols
Colin Boyd, Wenbo Mao
(abstract)
- Key Management II
- On Strengthening Authentication Protocols to Foil Cryptanalysis
Wenbo Mao, Colin Boyd
(abstract) - A Calculus for Secure Channel Establishment in Open Networks
Ueli M. Maurer, Pierre E. Schmid
(abstract)
- Measures
- Security versus Performance Requirements in Data Communication Systems
Vasilios Zorkadis
(abstract) - Valuation of Trust in Open Networks
Thomas Beth, Malte Borcherding, Birgit Klein
(abstract)