Research Catalog
Computer security, ESORICS 96 : 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings
- Title
- Computer security, ESORICS 96 : 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings / Elisa Bertino [and others], eds.
- Author
- European Symposium on Research in Computer Security (4th : 1996 : Rome, Italy)
- Publication
- Berlin ; New York : Springer, 1996.
Items in the Library & Off-site
Filter by
1 Item
Status | Format | Access | Call Number | Item Location |
---|---|---|---|---|
Text | Request in advance | QA76.9.A25 E98 1996 | Off-site |
Holdings
Details
- Additional Authors
- Bertino, Elisa.
- Description
- x, 364 pages : illustrations; 24 cm.
- Series Statement
- Lcture notes in computer science ; 1146
- Uniform Title
- Lecture notes in computer science ; 1146.
- Subject
- Bibliography (note)
- Includes bibliographical references and index.
- Contents
- Development of a Secure Electronic Marketplace for Europe / M. Waidner -- Light-Weight Micro-cash Payment for the Internet / W. Mao -- Digital Payment Systems with Passive Anonymity-Revoking Trustees / J. Camenisch, U. Maurer and M. Stadler -- An Authorization Model for Workflows / V. Atluri and W.-K. Huang -- Role Hierarchies and Constraints for Lattice-Based Access Controls / R. Sandhu -- A Multilevel Security Model for Distributed Object Systems / V. Nicomette and Y. Deswarte -- An Authorization Model for Federated Systems / S. De Capitani di Vimercati and P. Samarati -- Security for Mobile Agents: Authentication and State Appraisal / W. Farmer, J. Guttman and V. Swarup -- Server-Supported Signatures / N. Asokan, G. Tsudik and M. Waidner -- Sleepy Network-Layer Authentication Service for IPSEC / S. F. Wu -- Certified Electronic Mail / J. Zhou and D. Gollmann -- Distributed Proctoring / B. Schneier, J. Kelsey and J. Walker --
- Merging Heterogeneous Security Orderings / P. Bonatti, M. L. Sapino and V. S. Subrahmanian -- CSP and Anonymity / S. Schneider and A. Sidiropoulos -- Formal Semantics for Authentication Logics / G. Wedel and V. Kessler -- Threat Scenarios as a Means to Formally Develop Secure Systems / V. Lotz -- The Impact of Multilevel Security on Database Buffer Management / A. Warner, Q. Li, T. Keefe and S. Pal -- Enhancing the Controlled Disclosure of Sensitive Information / D. G. Marks, A. Motro and S. Jajodia -- Secure Concurrency Control in MLS Databases with Two Versions of Data / L. V. Mancini and I. Ray -- Modelling a Public-Key Infrastructure / U. Maurer -- Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches / C. A. Meadows.
- ISBN
- 3540617701 (alk. paper)
- LCCN
- 96043202
- OCLC
- 35364818
- ocm35364818
- Owning Institutions
- Columbia University Libraries