Sciweavers

ESORICS
1994
Springer
14 years 4 months ago
Aggregation in Relational Databases: Controlled Disclosure of Sensitive Information
It has been observed that often the release of a limited part of an information resource poses no security risks, but the relase of a sufficiently large part of that resource might...
Amihai Motro, Donald G. Marks, Sushil Jajodia
ESORICS
1994
Springer
14 years 4 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
ESORICS
1994
Springer
14 years 4 months ago
Non-Interference Through Determinism
A. W. Roscoe, Jim Woodcock, L. Wulf
ESORICS
1994
Springer
14 years 4 months ago
A Calculus for Secure Channel Establishment in Open Networks
This paper presents a calculus of channel security properties which allows to analyze and compare protocols for establishing secure in an insecure open network at a high level of a...
Ueli M. Maurer, Pierre E. Schmid
ESORICS
1994
Springer
14 years 4 months ago
Oblivious Signatures
Abstract. An oblivious signature with n keys (or messages) is a signature that the recipient can choose one of n keys (or messages) to get signed while the signer cannot find out o...
Lidong Chen
ESORICS
1994
Springer
14 years 4 months ago
Beacon Based Authentication
Azad Jiwa, Jennifer Seberry, Yuliang Zheng
ESORICS
1994
Springer
14 years 4 months ago
The ESPRIT Project CAFE - High Security Digital Payment Systems
CAFE ("Conditional Access for Europe") is an ongoing project in the European Community's ESPRIT program. The goal of CAFE is to develop innovative systems for condit...
Jean-Paul Boly, Antoon Bosselaers, Ronald Cramer, ...
ESORICS
1994
Springer
14 years 4 months ago
Authentication via Multi-Service Tickets in the Kuperee Server
Thomas Hardjono, Jennifer Seberry
ESORICS
1994
Springer
14 years 4 months ago
Liability and Computer Security: Nine Principles
The conventional wisdom is that security priorities should be set by risk analysis. However, reality is subtly different: many computer security systems are at least as much about ...
Ross J. Anderson