Computer Security, ESORICS 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings
"This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes."--PUBLISHER'S WEBSITE.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Towards Security in an Open Systems Federation
TypeLevel Access Controls for Distributed Structurally
21 other sections not shown
Other editions - View all
access control ACSa analysis application ASAA assume auth authentication protocols Authentication Server certification client clock communication Computer Science Computer Security computer systems conference covert channels credentials cryptographic protocols Cryptology cryptosystem database decryption defined deontic deontic logic detect digital signature distributed system encryption end-system Enterprise UExploration entities example execution formal fragmentation function hardware ICKDS identified IEEE implementation information flow initiator integrity interface intruder Kerberos key distribution KryptoKnight logic login mechanism module multilevel security nonce normative positions object object-oriented Open Systems Interconnection operating system packet participants password polyinstantiation principal problem Proc programs public key receiving process relation replay request RHODOS routers scheme Section security policy sending process signature single sign-on specification storage channels synchronization ticket timestamp transaction trusted tuple variable verify visa Visa protocol VISA-GRANT VISA-REQUEST visa-router workstation zero-knowledge proofs