Advertisement

Computer Security — ESORICS 92

Second European Symposium on Research in Computer Security Toulouse, France, November 23–25, 1992 Proceedings

  • Editors
  • Yves Deswarte
  • Gérard Eizenberg
  • Jean-Jacques Quisquater
Conference proceedings ESORICS 1992

Part of the Lecture Notes in Computer Science book series (LNCS, volume 648)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Access Control

    1. Front Matter
      Pages 1-1
    2. John A Bull, Li Gong, Karen R Sollins
      Pages 3-20
    3. Volker Kessler
      Pages 41-54
  3. Formal Methods

  4. Invited Talk

    1. Front Matter
      Pages 123-123
  5. Authentication I

    1. Front Matter
      Pages 139-139
    2. Ralf C. Hauser, E. Stewart Lee
      Pages 141-154
    3. Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti
      Pages 155-174
    4. Anas Tarah, Christian Huitema
      Pages 175-189
  6. Distributed Systems

  7. Authentication II

    1. Front Matter
      Pages 259-259
    2. Kwok-yan Lam, Dieter Gollmann
      Pages 261-271
    3. Colin Boyd
      Pages 273-292
    4. Kwok-Yan Lam, Thomas Beth
      Pages 293-303
  8. Database Security

    1. Front Matter
      Pages 305-305
    2. Ravi S. Sandhu, Sushil Jajodia
      Pages 307-328
  9. System Architectures

    1. Front Matter
      Pages 371-371
    2. Bruno d'Ausbourg, Jean-Henri Llareus
      Pages 373-391
    3. Christel Calas
      Pages 393-408
  10. Applications

    1. Front Matter
      Pages 409-409
    2. Ross J. Anderson
      Pages 411-418
    3. Joan Daemen, René Govaerts, Joos Vandewalle
      Pages 419-434
    4. Naji Habra, Baudouin Le Charlier, Abdelaziz Mounji, Isabelle Mathieu
      Pages 435-450
  11. Back Matter
    Pages 451-454

About these proceedings

Introduction

This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes. 

Keywords

Communication Security Computer Security Computersicherheit Data Integrity Database Datenbankensicherheit Datenintegrität Kommunikationssicherheit Network Protocols Netzwerkprotokolle Processing Security algorithms distributed systems

Bibliographic information

  • DOI https://doi.org/10.1007/BFb0013888
  • Copyright Information Springer-Verlag Berlin Heidelberg 1992
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-56246-7
  • Online ISBN 978-3-540-47488-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace