Ebook: Computer Security — ESORICS 92: Second European Symposium on Research in Computer Security Toulouse, France, November 23–25, 1992 Proceedings
- Tags: Operating Systems, Computer Communication Networks, Database Management
- Series: Lecture Notes in Computer Science 648
- Year: 1992
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes.
This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes.
This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes.
Content:
Front Matter....Pages -
Towards security in an open systems federation....Pages 1-20
Type-level access controls for distributed structurally object-oriented database systems....Pages 21-40
On the Chinese Wall model....Pages 41-54
Formal methods and automated tool for timing-channel identification in tcb source code....Pages 55-75
Separating the specification and implementation phases in cryptology....Pages 77-101
Formal specification of security requirements using the theory of normative positions....Pages 103-121
Breaking the traditional computer security research barriers....Pages 123-138
Verification and modelling of authentication protocols....Pages 139-154
Associating metrics to certification paths....Pages 155-174
An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributed systems....Pages 175-189
The development and testing of the identity-based conference key distribution system for the RHODOS distributed system....Pages 191-208
Policy enforcement in stub autonomous domains....Pages 209-228
Freshness assurance of authentication protocols....Pages 229-257
A formal framework for authentication....Pages 259-271
Timely authentication in distributed systems....Pages 273-292
Polyinstantiation for cover stories....Pages 293-303
On transaction processing for multilevel secure replicated databases....Pages 305-328
Security constraint processing in multilevel secure AMAC schemata....Pages 329-347
M2S: A machine for multilevel security....Pages 349-370
GDoM a multilevel document manager....Pages 371-391
UEPS — A second generation electronic wallet....Pages 393-408
A hardware design model for cryptographic algorithms....Pages 409-418
ASAX: Software architecture and rule-based language for universal audit trail analysis....Pages 419-434
Back Matter....Pages 435-450
....Pages -