|
" Computer security, ESORICS 96 : "
Elisa Bertino ... [et al.], eds.
Document Type
|
:
|
BL
|
Record Number
|
:
|
604490
|
Doc. No
|
:
|
b433709
|
Main Entry
|
:
|
European Symposium on Research in Computer Security(4th :1996 :, Rome, Italy)
|
Title & Author
|
:
|
Computer security, ESORICS 96 : : 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings /\ Elisa Bertino ... [et al.], eds.
|
Publication Statement
|
:
|
Berlin ;New York :: Springer,, 1996.
|
Series Statement
|
:
|
Lecture notes in computer science ;; 1146
|
Page. NO
|
:
|
x, 364 p. :: ill. ;; 24 cm.
|
ISBN
|
:
|
3540617701 (alk. paper)
|
|
:
|
: 9783540617709 (alk. paper)
|
Bibliographies/Indexes
|
:
|
Includes bibliographical references and index.
|
Contents
|
:
|
Development of a secure electronic marketplace for Europe / M. Waidner -- Light-weight micro-cash payment for the Internet / W. Mao -- Digital payment systems with passive anonymity-revoking trustees / J. Camenisch, U. Maurer, M. Stadler -- An authorization model for workflows / V. Atluri, W.-K. Huang -- Role hierarchies and constraints for lattice-based access controls / R. Sandhu -- A multilevel security model for distributed object systems / V. Nicomette, Y. Deswarte -- An authorization model for federated systems / S. De Capitani di Vimercati, P. Samarati -- Security for mobile agents : authentication and state appraisal / W. Farmer, J. Guttman, V. Swarup -- Server-supported signatures / N. Asokan, G. Tsudik, M. Waidner -- Sleepy network-layer authentication service for IPSEC / S.F. Wu -- Certified electronic mail / J. Zhou, D. Gollmann -- Distributed proctoring / B. Schneier, J. Kelsey, J. Walker -- Merging heterogeneous security orderings / P. Bonatti, M.L. Sapino, V.S. Subrahmanian -- CSP and anonymity / S. Schneider, A. Sidiropoulos -- Formal semantics for authentication logics / G. Wedel, V. Kessler -- Threat scenarios as a means to formally develop secure systems / V. Lotz -- The impact of multilevel security on database buffer management / A. Warner ... [et al.] -- Enhancing the controlled disclosure of sensitive information / D.G. Marks, A. Motro, S. Jajodia -- Secure concurrency control in MLS databases with two versions of data / L.V. Mancini, I. Ray -- Modelling a public-key infrastructure / U. Maurer -- Analyzing the Needham-Schroeder public-key protocol : a comparison of two approaches / C.A. Meadows.
|
Subject
|
:
|
Computer security, Congresses.
|
Dewey Classification
|
:
|
005.8
|
LC Classification
|
:
|
QA76.9.A25E98 1996
|
Added Entry
|
:
|
Bertino, Elisa.
|
| |