


default search action
4th ESORICS 1996: Rome, Italy
- Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo:

Computer Security - ESORICS 96, 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings. Lecture Notes in Computer Science 1146, Springer 1996, ISBN 3-540-61770-1
Session 1: Electronic Commerce
- Michael Waidner

:
Development of a Secure Electronic Marketplace for Europe. 1-14 - Wenbo Mao:

Light-Weight Micro-cash Payment for the Internet. 15-32 - Jan Camenisch, Ueli M. Maurer, Markus Stadler:

Digital Payment Systems with Passive Anonymity-Revoking Trustees. 33-43
Session 2: Advanced Access Control Models for Database Systems
- Vijayalakshmi Atluri

, Wei-kuang Huang:
An Authorization Model for Workflows. 44-64 - Ravi S. Sandhu:

Role Hierarchies and Constraints for Lattice-Based Access Controls. 65-79
Session 3: Distributed Systems
- Vincent Nicomette, Yves Deswarte:

A Multilevel Security Model for Distributed Object Systems. 80-98 - Sabrina De Capitani di Vimercati, Pierangela Samarati:

An Authorization Model for Federated Systems. 99-117
Session 4: Security Issues for Mobile Computing
- William M. Farmer, Joshua D. Guttman

, Vipin Swarup:
Security for Mobile Agents: Authentication and State Appraisal. 118-130 - N. Asokan, Gene Tsudik, Michael Waidner:

Server-Supported Signatures. 131-143
Panel
- Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth:

Limitations of the Approach of Solving a Network's Security Problem with a Firewall. 144-145
Session 5: Network Security 1
- Shyhtsun Felix Wu:

Sleepy Network-Layer Authentication Service for IPSEC. 146-159 - Jianying Zhou, Dieter Gollmann:

Certified Electronic Mail. 160-171 - Bruce Schneier, John Kelsey

, Jay Walker:
Distributed Proctoring. 172-182
Session 6: Theoretical Foundations of Security
- Piero A. Bonatti, Maria Luisa Sapino, V. S. Subrahmanian:

Merging Heterogeneous Security Orderings. 183-197 - Steve A. Schneider

, Abraham Sidiropoulos:
CSP and Anonymity. 198-218 - Gabriele Wedel, Volker Kessler:

Formal Semantics for Authentication Logics. 219-241 - Volkmar Lotz:

Threat Scenarios as a Means to Formally Develop Secure Systems. 242-265
Session 7: Secure Database Architectures
- Andrew Warner, Qiang Li, Thomas F. Keefe, Shankar Pal:

The Impact of Multilevel Security on Database Buffer Management. 266-289 - Donald G. Marks, Amihai Motro, Sushil Jajodia:

Enhancing the Controlled Disclosure of Sensitive Information. 290-303 - Luigi V. Mancini, Indrajit Ray:

Secure Concurrency Control in MLS Databases with Two Versions of Data. 304-323
Panel
- Gérard Eizenberg, Dominique Gonthier, Alistair Kelman, Jean-Jacques Quisquater:

Authors' Rights and Copyright Protection. 324
Session 8: Network Security 2
- Ueli M. Maurer:

Modelling a Public-Key Infrastructure. 325-350 - Catherine A. Meadows:

Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches. 351-364

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














