CCS
14 years 1 months ago
1994 ACM
At the heart of most computer systems is a file system. The file system contains user data, executable programs, configuration and authorization information, and (usually) the bas...
ESORICS
14 years 1 months ago
1994 Springer
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
ESORICS
14 years 1 months ago
1994 Springer
CAFE ("Conditional Access for Europe") is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for condit...
ESORICS
14 years 1 months ago
1994 Springer
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
CSFW
14 years 1 months ago
1994 IEEE |