Search dblp for Publications

export results for "toc:db/conf/esorics/esorics2000.bht:"

 download as .bib file

@inproceedings{DBLP:conf/esorics/BellaMPT00,
  author       = {Giampaolo Bella and
                  Fabio Massacci and
                  Lawrence C. Paulson and
                  Piero Tramontano},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Formal Verification of Cardholder Registration in {SET}},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {159--174},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_10},
  doi          = {10.1007/10722599\_10},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BellaMPT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BieberCGLWZ00,
  author       = {Pierre Bieber and
                  Jacques Cazin and
                  Pierre Girard and
                  Jean{-}Louis Lanet and
                  Virginie Wiels and
                  Guy Zanon},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Checking Secure Interactions of Smart Card Applets},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_1},
  doi          = {10.1007/10722599\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BieberCGLWZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/BroadfootLR00,
  author       = {Philippa J. Broadfoot and
                  Gavin Lowe and
                  A. W. Roscoe},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Automating Data Independence},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {175--190},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_11},
  doi          = {10.1007/10722599\_11},
  timestamp    = {Mon, 18 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/BroadfootLR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Brose00,
  author       = {Gerald Brose},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {A Typed Access Control Model for {CORBA}},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {88--105},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_6},
  doi          = {10.1007/10722599\_6},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Brose00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Bryce00,
  author       = {Ciar{\'{a}}n Bryce},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {A Security Framework for a Mobile Agent System},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {273--290},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_17},
  doi          = {10.1007/10722599\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Bryce00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/EvansS00,
  author       = {Neil Evans and
                  Steve A. Schneider},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Analysing Time Dependent Security Properties in {CSP} Using {PVS}},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {222--237},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_14},
  doi          = {10.1007/10722599\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/EvansS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/GuttmanHT00,
  author       = {Joshua D. Guttman and
                  Amy L. Herzog and
                  F. Javier Thayer},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Authentication and Confidentiality via {IPSEC}},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {255--272},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_16},
  doi          = {10.1007/10722599\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/GuttmanHT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Herreweghen00,
  author       = {Els Van Herreweghen},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Secure Anonymous Signature-Based Transactions},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {55--71},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_4},
  doi          = {10.1007/10722599\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Herreweghen00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HowellK00,
  author       = {Jon Howell and
                  David Kotz},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {A Formal Semantics for {SPKI}},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {140--158},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_9},
  doi          = {10.1007/10722599\_9},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HowellK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/KochMP00,
  author       = {Manuel Koch and
                  Luigi V. Mancini and
                  Francesco Parisi{-}Presicce},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {A Formal Model for Role-Based Access Control Using Graph Transformation},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {122--139},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_8},
  doi          = {10.1007/10722599\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/KochMP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Mantel00,
  author       = {Heiko Mantel},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Unwinding Possibilistic Security Properties},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {238--254},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_15},
  doi          = {10.1007/10722599\_15},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Mantel00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MasucciS00,
  author       = {Barbara Masucci and
                  Douglas R. Stinson},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Metering Schemes for General Access Structures},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_5},
  doi          = {10.1007/10722599\_5},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MasucciS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MolvaR00,
  author       = {Refik Molva and
                  Yves Roudier},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {A Distributed Access Control Model for Java},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {291--308},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_18},
  doi          = {10.1007/10722599\_18},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MolvaR00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/PaulLG00,
  author       = {Olivier Paul and
                  Maryline Laurent and
                  Sylvain Gombault},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {A Full Bandwidth {ATM} Firewall},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {206--221},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_13},
  doi          = {10.1007/10722599\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/PaulLG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Rannenberg00,
  author       = {Kai Rannenberg},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {How Much Negotiation and Detail Can Users Handle? Experiences with
                  Security Negotiation and the Granularity of Access Control in Communications},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_3},
  doi          = {10.1007/10722599\_3},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Rannenberg00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/SchellhornRSKAT00,
  author       = {Gerhard Schellhorn and
                  Wolfgang Reif and
                  Axel Schairer and
                  Paul A. Karger and
                  Vernon Austel and
                  David C. Toll},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Verification of a Formal Security Model for Multiapplicative Smart
                  Cards},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {17--36},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_2},
  doi          = {10.1007/10722599\_2},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/SchellhornRSKAT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Soshi00,
  author       = {Masakazu Soshi},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Safety Analysis of the Dynamic-Typed Access Matrix Model},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {106--121},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_7},
  doi          = {10.1007/10722599\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/Soshi00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/WelchS00,
  author       = {Ian Welch and
                  Robert J. Stroud},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Using Reflection as a Mechanism for Enforcing Security Policies in
                  Mobile Code},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_19},
  doi          = {10.1007/10722599\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/WelchS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YodaE00,
  author       = {Kunikazu Yoda and
                  Hiroaki Etoh},
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Finding a Connection Chain for Tracing Intruders},
  booktitle    = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  pages        = {191--205},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599\_12},
  doi          = {10.1007/10722599\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/YodaE00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/esorics/2000,
  editor       = {Fr{\'{e}}d{\'{e}}ric Cuppens and
                  Yves Deswarte and
                  Dieter Gollmann and
                  Michael Waidner},
  title        = {Computer Security - {ESORICS} 2000, 6th European Symposium on Research
                  in Computer Security, Toulouse, France, October 4-6, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1895},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10722599},
  doi          = {10.1007/10722599},
  isbn         = {3-540-41031-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics