2. ESORICS 1992: Toulouse, France

Access Control

Formal Methods

Invited Talk

Authentication 1

Distributed Systems

Authentication 2

Database Security

System Architectures

Applications