Nicht aus der Schweiz? Besuchen Sie lehmanns.de

Computer Security - ESORICS 96

4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings
Buch | Softcover
XI, 377 Seiten
1996 | 1996
Springer Berlin (Verlag)
978-3-540-61770-9 (ISBN)

Lese- und Medienproben

Computer Security - ESORICS 96 -
CHF 74,85 inkl. MwSt
This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Development of a Secure Electronic Marketplace for Europe.- Lightweight micro-cash for the internet.- Digital payment systems with passive anonymity-revoking trustees.- An authorization model for workflows.- Role hierarchies and constraints for lattice-based access controls.- A multilevel security model for distributed object systems.- An authorization model for federated systems.- Security for mobile agents: Authentication and state appraisal.- Server-Supported Signatures.- Limitations of the approach of solving a network's security problems with a firewall.- Sleepy network-layer authentication service for IPSEC.- Certified electronic mail.- Distributed proctoring.- Merging heterogeneous security orderings.- CSP and anonymity.- Formal semantics for authentication logics.- Threat scenarios as a means to formally develop secure systems.- The impact of multilevel security on database buffer management.- Enhancing the controlled disclosure of sensitive information.- Secure concurrency control in MLS databases with two versions of data.- Panel session: Authors' rights and copyright protection.- Modelling a public-key infrastructure.- Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches.

Erscheint lt. Verlag 16.9.1996
Reihe/Serie Lecture Notes in Computer Science
Zusatzinfo XI, 377 p.
Verlagsort Berlin
Sprache englisch
Maße 155 x 235 mm
Gewicht 500 g
Themenwelt Mathematik / Informatik Informatik Betriebssysteme / Server
Informatik Theorie / Studium Kryptologie
Schlagworte Computer Security • Computersicherheit • Datenbankensicherheit • Datenschutz • Datensicherung • Distributed Systems • Electronic Commerce • Elektronischer Kommerz • Hardcover, Softcover / Informatik, EDV/Betriebssysteme, Benutzeroberflächen • HC/Informatik, EDV/Betriebssysteme, Benutzeroberflächen • HC/Informatik, EDV/Informatik • mobile computing • Network Security • Netzwerksicherheit • secure databases • security • Verteilte Systeme • Verteilte Verarbeitung
ISBN-10 3-540-61770-1 / 3540617701
ISBN-13 978-3-540-61770-9 / 9783540617709
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich