Abstract is missing.
- Valuation of Trust in Open NetworksThomas Beth, Malte Borcherding, Birgit Klein. 3-18 [doi]
- Security Versus Performance Requirements in Data Communications SystemsVasilios Zorkadis. 19-30 [doi]
- Non-Interference Through DeterminismA. W. Roscoe, Jim Woodcock, L. Wulf. 33-53 [doi]
- Compile-Time Detection of Information Flow in Sequential ProgramsJean-Pierre Banâtre, Ciarán Bryce, Daniel Le Métayer. 55-73 [doi]
- Security Through Type AnalysisColin O Halloran, Chris T. Sennett. 75-89 [doi]
- Designing Secure Key Exchange ProtocolsColin Boyd, Wenbo Mao. 93-105 [doi]
- Robust and Secure Password and Key Change MethodRalf C. Hauser, Philippe A. Janson, Refik Molva, Gene Tsudik, Els Van Herreweghen. 107-122 [doi]
- Beacon Based AuthenticationAzad Jiwa, Jennifer Seberry, Yuliang Zheng. 125-141 [doi]
- Authentication via Multi-Service Tickets in the Kuperee ServerThomas Hardjono, Jennifer Seberry. 143-160 [doi]
- Oblivious SignaturesLidong Chen. 161-172 [doi]
- A Calculus for Secure Channel Establishment in Open NetworksUeli M. Maurer, Pierre E. Schmid. 175-192 [doi]
- On Strengthening Authentication Protocols to Foil CryptanalysisWenbo Mao, Colin Boyd. 193-204 [doi]
- An Efficient Electronic Payment System Protecting PrivacyJan Camenisch, Jean-Marc Piveteau, Markus Stadler. 207-215 [doi]
- The ESPRIT Project CAFE - High Security Digital Payment SystemsJean-Paul Boly, Antoon Bosselaers, Ronald Cramer, Rolf Michelsen, Stig Fr. Mjølsnes, Frank Muller, Torben P. Pedersen, Birgit Pfitzmann, Peter de Rooij, Berry Schoenmakers, Matthias Schunter, Luc Vallée, Michael Waidner. 217-230 [doi]
- Liability and Computer Security: Nine PrinciplesRoss J. Anderson. 231-245 [doi]
- Implementing Secure Dependencies over a Network by Designing a Distributed Security SubSystemBruno d Ausbourg. 249-266 [doi]
- A Secure Medium Access Control Protocol: Security vs PerformancesPierre Siron, Bruno d Ausbourg. 267-279 [doi]
- Distributed File System over a Multilevel Secure Architecture - Problems and SolutionsChristel Calas. 281-297 [doi]
- On the Expressive Power of the Unary Transformation ModelRavi S. Sandhu, Srinivas Ganta. 301-318 [doi]
- Privilege Graph: an Extension to the Typed Access Matrix ModelMarc Dacier, Yves Deswarte. 319-334 [doi]
- A Consideration of the Modes of Operation for Secure SystemsC. L. Robinson, Simon R. Wiseman. 335-356 [doi]
- Mark-and-Sweep Garbage Collection in Multilevel Secure Object-Oriented Database SystemsAlessandro Ciampichetti, Elisa Bertino, Luigi V. Mancini. 359-373 [doi]
- Decomposition of Multilevel Objects in an Object-Oriented DatabaseNora Boulahia-Cuppens, Frédéric Cuppens, Alban Gabillon, Kioumars Yazdanian. 375-402 [doi]
- Supporting Object-Based High-Assurance Write-up in Multilevel Databases for the Replicated ArchitectureRoshan K. Thomas, Ravi S. Sandhu. 403-428 [doi]
- Aggregation in Relational Databases: Controlled Disclosure of Sensitive InformationAmihai Motro, Donald G. Marks, Sushil Jajodia. 431-445 [doi]
- Information Flow Controls vs Interference Controls: An Integrated ApproachFrédéric Cuppens, Gilles Trouessin. 447-468 [doi]