Document - eBookmela
Loading...

Computer security ESORICS 2000 : 6th European Symposium on Research in Computer Security, Toulouse, France, O | European Symposium on Research in Computer Security (6th : 2000 : Toulouse, France), Cuppens, Frédéric

Likes0
Telegram icon Share on Telegram

Computer security ESORICS 2000 : 6th European Symposium on Research in Computer Security, Toulouse, France, O

User Rating: Be the first one!

Author: European Symposium on Research in Computer Security (6th : 2000 : Toulouse, France), Cuppens, Frédéric

Added by: sketch

Added Date: 2015-12-30

Publication Date: 2000

Language: eng

Subjects: Computer security

Publishers: Berlin ; New York : Springer

Collections: folkscanomy miscellaneous, folkscanomy, additional collections

ISBN Number: 3540410317

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 179.96 MB

PDF Size: 2.93 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Archive Url

Downloads: 429

Views: 479

Total Files: 18

Media Type: texts

Description

Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings
Author: Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41031-7
DOI: 10.1007/10722599

Table of Contents:

  • Checking Secure Interactions of Smart Card Applets
  • Verification of a Formal Security Model for Multiapplicative Smart Cards
  • How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications
  • Secure Anonymous Signature-Based Transactions
  • Metering Schemes for General Access Structures
  • A Typed Access Control Model for CORBA
  • Safety Analysis of the Dynamic-Typed Access Matrix Model
  • A Formal Model for Role-Based Access Control Using Graph Transformation
  • A Formal Semantics for SPKI
  • Formal Verification of Cardholder Registration in SET
  • Automating Data Independence
  • Finding a Connection Chain for Tracing Intruders
  • A Full Bandwidth ATM Firewall
  • Analysing Time Dependent Security Properties in CSP Using PVS
  • Unwinding Possibilistic Security Properties
  • Authentication and Confidentiality via IPsec
  • A Security Framework for a Mobile Agent System
  • A Distributed Access Control Model for Java
  • Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code

Includes bibliographical references and index
eBookmela
Logo
Register New Account