Security Protocols (Record no. 34039)

000 -LEADER
fixed length control field 04440nam a22006015i 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9783540398714
-- 978-3-540-39871-4
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.82
245 10 - TITLE STATEMENT
Title Security Protocols
Sub Title 10th International Workshop, Cambridge, UK, April 17-19, 2002. Revised Papers /
Statement of responsibility, etc edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
260 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication Berlin, Heidelberg :
Name of publisher Springer Berlin Heidelberg,
Year of publication 2004.
300 ## - PHYSICAL DESCRIPTION
Number of Pages VIII, 248 p.
Other physical details online resource.
490 1# - SERIES STATEMENT
Series statement Lecture Notes in Computer Science,
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note (Transcript) -- Keynote Address -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties -- Is Entity Authentication Necessary? -- A Structured Operational Modelling of the Dolev-Yao Threat Model -- On Trust Establishment in Mobile Ad-Hoc Networks -- Legally Authorized and Unauthorized Digital Evidence -- Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing -- Contractual Access Control -- Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks -- Analyzing Delegation Properties -- Combinatorial Optimization of Countermeasures against Illegal Copying -- Protocols with Certified-Transfer Servers -- An Architecture for an Adaptive Intrusion-Tolerant Server -- Supporting Imprecise Delegation in KeyNote -- Modeling Protocols for Secure Group Communications in Ad Hoc Networks -- Delegation of Signalling Rights -- Mobile IPv6 Security -- Concluding Discussion: Accounting for Resources -- Back to the Beginning.
520 ## - SUMMARY, ETC.
Summary, etc Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was “Discerning the Protocol Participants.” Security protocols are usually described in terms of the active participants – Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer science.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating systems (Computers).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data encryption (Computer science).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer software.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Information Systems.
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Science.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Data Encryption.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computer Communication Networks.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Operating Systems.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Algorithm Analysis and Problem Complexity.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Computers and Society.
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Management of Computing and Information Systems.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Christianson, Bruce.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Crispo, Bruno.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Malcolm, James A.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Roe, Michael.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://dx.doi.org/10.1007/b94819
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type E-BOOKS
264 #1 -
-- Berlin, Heidelberg :
-- Springer Berlin Heidelberg,
-- 2004.
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
347 ## -
-- text file
-- PDF
-- rda
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
-- 0302-9743 ;
Holdings
Withdrawn status Lost status Damaged status Not for loan Current library Accession Number Uniform Resource Identifier Koha item type
        IMSc Library EBK4745 http://dx.doi.org/10.1007/b94819 E-BOOKS
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha