The SCEAS System
Navigation Menu

Conferences in DBLP

European Symposium on Research in Computer Security (ESORICS) (esorics)
1990 (conf/esorics/1990)


  1. The SeaView Secure Database System: A Progress Report. [Citation Graph (, )][DBLP]


  2. Relational Database Granularity. [Citation Graph (, )][DBLP]


  3. Group-Oriented Discretionary Access Controls for Distributed Structurally Object-Oriented Database Systems. [Citation Graph (, )][DBLP]


  4. A General Framework for Database Security. [Citation Graph (, )][DBLP]


  5. A General Mechanism for Access Control: Its Relationship to Secure System Concepts. [Citation Graph (, )][DBLP]


  6. An Object-Oriented Architecture to Support System Reliability and Security. [Citation Graph (, )][DBLP]


  7. Security Kernel Design and Implementation in the IBM PC Environment. [Citation Graph (, )][DBLP]


  8. Authentication and Access Control in a Distributed System. [Citation Graph (, )][DBLP]


  9. A Security Reclassifier for a Local Area Network. [Citation Graph (, )][DBLP]


  10. An Intrusion-Tolerant Security Server for an Open Distributed System. [Citation Graph (, )][DBLP]


  11. An Architecture for a Trusted Network. [Citation Graph (, )][DBLP]


  12. Using Deducibility in Secure Network Modelling. [Citation Graph (, )][DBLP]


  13. CHIMÆRA: A Network Security Model. [Citation Graph (, )][DBLP]


  14. An Epistemic and Deontic Logic for Reasoning about Computer Security. [Citation Graph (, )][DBLP]


  15. A Calculus of Information Flow. [Citation Graph (, )][DBLP]


  16. Better Login Protocols for Computer Networks. [Citation Graph (, )][DBLP]


  17. An Identity-Based Scheme Providing Zero-Knowledge Authentication and Authenticated Key Exchange. [Citation Graph (, )][DBLP]


  18. Pseudorandom Permutations Based on the D.E.S. Scheme. [Citation Graph (, )][DBLP]


  19. Towards an Object Oriented Development Environment for Secure Applications. [Citation Graph (, )][DBLP]


  20. A Case Study in the Formal Refinement of a Distributed Secure System. [Citation Graph (, )][DBLP]


  21. Epistemic Verification of Cryptographic Protocols. [Citation Graph (, )][DBLP]


  22. Methodology "Minerve Security" - Evaluation Process of Software Security. [Citation Graph (, )][DBLP]


  23. Managing Computer Security: How Can Research Help? [Citation Graph (, )][DBLP]


  24. Harmonised Criteria for the Security Evaluation of IT Systems and Products. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002