The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
2000 (conf/esorics/2000)

  1. Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-Louis Lanet, Virginie Wiels, Guy Zanon
    Checking Secure Interactions of Smart Card Applets. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:1-16 [Conf]
  2. Gerhard Schellhorn, Wolfgang Reif, Axel Schairer, Paul A. Karger, Vernon Austel, David C. Toll
    Verification of a Formal Security Model for Multiapplicative Smart Cards. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:17-36 [Conf]
  3. Kai Rannenberg
    How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:37-54 [Conf]
  4. Els Van Herreweghen
    Secure Anonymous Signature-Based Transactions. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:55-71 [Conf]
  5. Barbara Masucci, Douglas R. Stinson
    Metering Schemes for General Access Structures. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:72-87 [Conf]
  6. Gerald Brose
    A Typed Access Control Model for CORBA. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:88-105 [Conf]
  7. Masakazu Soshi
    Safety Analysis of the Dynamic-Typed Access Matrix Model. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:106-121 [Conf]
  8. Manuel Koch, Luigi V. Mancini, Francesco Parisi-Presicce
    A Formal Model for Role-Based Access Control Using Graph Transformation. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:122-139 [Conf]
  9. Jon Howell, David Kotz
    A Formal Semantics for SPKI. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:140-158 [Conf]
  10. Giampaolo Bella, Fabio Massacci, Lawrence C. Paulson, Piero Tramontano
    Formal Verification of Cardholder Registration in SET. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:159-174 [Conf]
  11. Philippa J. Broadfoot, Gavin Lowe, A. W. Roscoe
    Automating Data Independence. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:175-190 [Conf]
  12. Kunikazu Yoda, Hiroaki Etoh
    Finding a Connection Chain for Tracing Intruders. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:191-205 [Conf]
  13. Olivier Paul, Maryline Laurent, Sylvain Gombault
    A Full Bandwidth ATM Firewall. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:206-221 [Conf]
  14. Neil Evans, Steve Schneider
    Analysing Time Dependent Security Properties in CSP Using PVS. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:222-237 [Conf]
  15. Heiko Mantel
    Unwinding Possibilistic Security Properties. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:238-254 [Conf]
  16. Joshua D. Guttman, Amy L. Herzog, F. Javier Thayer
    Authentication and Confidentiality via IPSEC. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:255-272 [Conf]
  17. Ciarán Bryce
    A Security Framework for a Mobile Agent System. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:273-290 [Conf]
  18. Refik Molva, Yves Roudier
    A Distributed Access Control Model for Java. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:291-308 [Conf]
  19. Ian Welch, Robert J. Stroud
    Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. [Citation Graph (0, 0)][DBLP]
    ESORICS, 2000, pp:309-323 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002