Computer Security — ESORICS 92

Second European Symposium on Research in Computer Security Toulouse, France, November 23–25, 1992 Proceedings

  • Editors
  • Yves Deswarte
  • Gérard Eizenberg
  • Jean-Jacques Quisquater
Conference proceedings ESORICS 1992

DOI: 10.1007/BFb0013888

Part of the Lecture Notes in Computer Science book series (LNCS, volume 648)

Table of contents (24 papers)

  1. Front Matter
    Pages I-XI
  2. Access Control

    1. Front Matter
      Pages 1-1
    2. John A Bull, Li Gong, Karen R Sollins
      Pages 3-20
    3. Volker Kessler
      Pages 41-54
  3. Formal Methods

  4. Invited Talk

    1. Front Matter
      Pages 123-123
  5. Authentication I

    1. Front Matter
      Pages 139-139
    2. Ralf C. Hauser, E. Stewart Lee
      Pages 141-154
    3. Refik Molva, Gene Tsudik, Els Van Herreweghen, Stefano Zatti
      Pages 155-174
    4. Anas Tarah, Christian Huitema
      Pages 175-189
  6. Distributed Systems

  7. Authentication II

    1. Front Matter
      Pages 259-259

About these proceedings

Introduction

This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes. 

Keywords

Communication Security Computer Security Computersicherheit Data Integrity Database Datenbankensicherheit Datenintegrität Kommunikationssicherheit Network Protocols Netzwerkprotokolle Processing Security algorithms distributed systems

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 1992
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-56246-7
  • Online ISBN 978-3-540-47488-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349