رکورد قبلیرکورد بعدی

" Computer security, ESORICS 96 : "


Document Type : BL
Record Number : 604490
Doc. No : b433709
Main Entry : European Symposium on Research in Computer Security(4th :1996 :, Rome, Italy)
Title & Author : Computer security, ESORICS 96 : : 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings /\ Elisa Bertino ... [et al.], eds.
Publication Statement : Berlin ;New York :: Springer,, 1996.
Series Statement : Lecture notes in computer science ;; 1146
Page. NO : x, 364 p. :: ill. ;; 24 cm.
ISBN : 3540617701 (alk. paper)
: : 9783540617709 (alk. paper)
Bibliographies/Indexes : Includes bibliographical references and index.
Contents : Development of a secure electronic marketplace for Europe / M. Waidner -- Light-weight micro-cash payment for the Internet / W. Mao -- Digital payment systems with passive anonymity-revoking trustees / J. Camenisch, U. Maurer, M. Stadler -- An authorization model for workflows / V. Atluri, W.-K. Huang -- Role hierarchies and constraints for lattice-based access controls / R. Sandhu -- A multilevel security model for distributed object systems / V. Nicomette, Y. Deswarte -- An authorization model for federated systems / S. De Capitani di Vimercati, P. Samarati -- Security for mobile agents : authentication and state appraisal / W. Farmer, J. Guttman, V. Swarup -- Server-supported signatures / N. Asokan, G. Tsudik, M. Waidner -- Sleepy network-layer authentication service for IPSEC / S.F. Wu -- Certified electronic mail / J. Zhou, D. Gollmann -- Distributed proctoring / B. Schneier, J. Kelsey, J. Walker -- Merging heterogeneous security orderings / P. Bonatti, M.L. Sapino, V.S. Subrahmanian -- CSP and anonymity / S. Schneider, A. Sidiropoulos -- Formal semantics for authentication logics / G. Wedel, V. Kessler -- Threat scenarios as a means to formally develop secure systems / V. Lotz -- The impact of multilevel security on database buffer management / A. Warner ... [et al.] -- Enhancing the controlled disclosure of sensitive information / D.G. Marks, A. Motro, S. Jajodia -- Secure concurrency control in MLS databases with two versions of data / L.V. Mancini, I. Ray -- Modelling a public-key infrastructure / U. Maurer -- Analyzing the Needham-Schroeder public-key protocol : a comparison of two approaches / C.A. Meadows.
Subject : Computer security, Congresses.
Dewey Classification : ‭005.8‬
LC Classification : ‭QA76.9.A25‬‭E98 1996‬
Added Entry : Bertino, Elisa.
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟