Computer security ESORICS 2000 : 6th European Symposium on Research in Computer Security, Toulouse, France, O | European Symposium on Research in Computer Security (6th : 2000 : Toulouse, France), Cuppens, Frédéric
Computer security ESORICS 2000 : 6th European Symposium on Research in Computer Security, Toulouse, France, O
User Rating: Be the first one!
Author: European Symposium on Research in Computer Security (6th : 2000 : Toulouse, France), Cuppens, Frédéric
Added by: sketch
Added Date: 2015-12-30
Publication Date: 2000
Language: eng
Subjects: Computer security
Publishers: Berlin ; New York : Springer
Collections: folkscanomy miscellaneous, folkscanomy, additional collections
ISBN Number: 3540410317
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 179.96 MB
PDF Size: 2.93 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 429
Views: 479
Total Files: 18
Media Type: texts
Description
Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings
Author: Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41031-7
DOI: 10.1007/10722599
Table of Contents:
Includes bibliographical references and index
Author: Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41031-7
DOI: 10.1007/10722599
Table of Contents:
- Checking Secure Interactions of Smart Card Applets
- Verification of a Formal Security Model for Multiapplicative Smart Cards
- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications
- Secure Anonymous Signature-Based Transactions
- Metering Schemes for General Access Structures
- A Typed Access Control Model for CORBA
- Safety Analysis of the Dynamic-Typed Access Matrix Model
- A Formal Model for Role-Based Access Control Using Graph Transformation
- A Formal Semantics for SPKI
- Formal Verification of Cardholder Registration in SET
- Automating Data Independence
- Finding a Connection Chain for Tracing Intruders
- A Full Bandwidth ATM Firewall
- Analysing Time Dependent Security Properties in CSP Using PVS
- Unwinding Possibilistic Security Properties
- Authentication and Confidentiality via IPsec
- A Security Framework for a Mobile Agent System
- A Distributed Access Control Model for Java
- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Includes bibliographical references and index