2. CCS 1994:
Fairfax,
Virginia,
USA
CCS '94,
Proceedings of the 2nd ACM Conference on Computer and Communications Security,
November 2-4,
1994,
Fairfax,
Virginia,
USA. ACM,
1994
- Trent Jaeger, Atul Prakash:
Support for the File System Security Requirements of Computational E-Mail Systems.
1-9
- Vaduvur Bharghavan:
Secure Wireless LANs.
10-17
- Gene H. Kim, Eugene H. Spafford:
The Design and Implementation of Tripwire: A File System Integrity Checker.
18-29
- Marjan Jurecic, Herbert Bunz:
Exchange of Patient Records - Prototype Implementation of a Security Attributes Service in X.500.
30-38
- Edward Amoroso, Carol Taylor, John Watson, Jonathan Weiss:
A Process-Oriented Methodology for Assessing and Improving Software Trustworthiness.
39-50
- Thomas Beth, Hans-Joachim Knobloch, Marcus Otten, Gustavus J. Simmons, Peer Wichmann:
Towards Acceptable Key Escrow Systems.
51-58
- Matt Blaze:
Protocol Failure in the Escrowed Encryption Standard.
59-67
- Michael K. Reiter:
Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart.
68-80
- Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot:
On Key Distribution via True Broadcasting.
81-88
- Chris Charnes, Josef Pieprzyk, Reihaneh Safavi-Naini:
Conditionally Secure Secret Sharing Schemes with Disenrollment Capability.
89-95
- Patrick Horster, Holger Petersen, Markus Michels:
Meta-ElGamal Signature Schemes.
96-107
- Steven H. Low, Sanjoy Paul, Nicholas F. Maxemchuk:
Anonymous Credit Cards.
108-117
- Paul Ammann, Sushil Jajodia:
An Efficient Multiversion Algorithm for Secure Servicing of Transaction Reads.
118-125
- Elisa Bertino, Claudio Bettini, Pierangela Samarati:
A Temporal Authorization Model.
126-135
- Pierangela Samarati, Paul Ammann, Sushil Jajodia:
Propagation of Authorizations in Distributed Database Systems.
136-147
- Howard M. Heys, Stafford E. Tavares:
The Design of Substitution-Permutation Networks Resistant to Differential and Linear Cryptanalysis.
148-155
- M. Zhang, Stafford E. Tavares, L. L. Campbell:
Information Leakage of Boolean Functions and Its Relationship to Other Cryptographic Criteria.
156-165
- L. Tombak, Reihaneh Safavi-Naini:
Authentication Codes That Are r-Fold Secure Against Spoofing.
166-169
- Gennady Medvinsky, Charlie Lai, B. Clifford Neuman:
Endorsements, Licensing, and Insurance for Distributed System Services.
170-175
- Li Gong:
New Protocols for Third-Party-Based Authentication and Secure Broadcast.
176-183
- Tatsuaki Okamoto, Kazuo Ohta:
How to Simultaneously Exchange Secrets by General Assumptions.
184-192
- Warwick Ford, Michael J. Wiener:
A Key Distribution Method for Object-Based Protection.
193-197
- Thomas R. Cain, Alan T. Sherman:
How to Break Gifford's Cipher (extended abstract).
198-209
- Paul C. van Oorschot, Michael J. Wiener:
Parallel Collision Search with Application to Hash Functions and Discrete Logarithms.
210-218
- Refik Molva, Erich Rütsche:
Application Access Control at Network Level.
219-228
- P. Rolin, Laurent Toutain, Sylvain Gombault:
Network Security Probe.
229-240
- Alison Anderson, Dennis Longley, Lam-for Kwok:
Security Modelling for Organisations.
241-250
- James W. Coyne, Norman C. Kluksdahl:
``Mainstreaming'' Automated Information Systems Security Engineering (a case study in security run amok).
251-257
- Heather M. Hinton, E. Stewart Lee:
The Compatibility of Policies.
258-269
- Randy Browne:
An Entropy Conservation Law for Testing the Completeness of Convert Channel Analysis.
270-281
- John P. Nestor, E. S. Lee:
Prerequisite Confidentiality.
282-293
Copyright © Sun Mar 14 22:57:23 2010
by Michael Ley (ley@uni-trier.de)