Table of contents (26 papers)

  1. Front Matter
  2. Valuation of trust in open networks
    Thomas Beth, Malte Borcherding, Birgit Klein
    Pages 1-18
  3. Non-interference through determinism
    A. W. Roscoe, J. C. P. Woodcock, L. Wulf
    Pages 31-53
  4. Compile-time detection of information flow in sequential programs
    Jean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer
    Pages 55-73
  5. Security through type analysis
    C. O'Halloran, C. T. Sennett
    Pages 75-89
  6. Designing secure key exchange protocols
    Colin Boyd, Wenbo Mao
    Pages 91-105
  7. Robust and secure password and key change method
    Ralf Hauser, Philippe Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen
    Pages 107-122
  8. Beacon based authentication
    Azad Jiwa, Jennifer Seberry, Yuliang Zheng
    Pages 123-141
  9. Authentication via multi-service tickets in the Kuperee server
    Thomas Hardjono, Jennifer Seberry
    Pages 143-160
  10. Oblivious signatures
    Lidong Chen
    Pages 161-172
  11. A calculus for secure channel establishment in open networks
    Ueli M. Maurer, Pierre E. Schmid
    Pages 173-192
  12. An efficient electronic payment system protecting privacy
    Jan L. Camenisch, Jean-Marc Piveteau, Markus A. Stadler
    Pages 205-215
  13. The ESPRIT project CAFE —High security digital payment systems
    Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Mjølsnes, Frank Muller et al.
    Pages 217-230
  14. Liability and computer security: Nine principles
    Ross J. Anderson
    Pages 231-245
  15. A secure medium access control protocol: Security versus performances
    Pierre Siron, Bruno d'Ausbourg
    Pages 267-279
  16. On the expressive power of the unary transformation model
    Ravi S. Sandhu, Srinivas Ganta
    Pages 299-318

About these proceedings


This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.


Access Control Computersicherheit Data Security Database Security Datenbanksicherheit Datensicherheit Information System Security Systemsicherheit Zugangskontrolle communication computer security security

Bibliographic information

  • Copyright Information Springer-Verlag 1994
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-58618-0
  • Online ISBN 978-3-540-49034-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349