Computer Security — ESORICS 96 [electronic resource] : 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings / edited by Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo.

Contributor(s): Bertino, Elisa [editor.] | Kurth, Helmut [editor.] | Martella, Giancarlo [editor.] | Montolivo, Emilio [editor.] | SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 1146Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1996Description: XI, 377 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540706755Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Database management | Information Systems | Management information systems | Computer Science | Operating Systems | Management of Computing and Information Systems | Computer Communication Networks | Data Encryption | Database Management | Business Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.43 LOC classification: QA76.76.O63Online resources: Click here to access online
Contents:
Development of a Secure Electronic Marketplace for Europe -- Lightweight micro-cash for the internet -- Digital payment systems with passive anonymity-revoking trustees -- An authorization model for workflows -- Role hierarchies and constraints for lattice-based access controls -- A multilevel security model for distributed object systems -- An authorization model for federated systems -- Security for mobile agents: Authentication and state appraisal -- Server-Supported Signatures -- Limitations of the approach of solving a network's security problems with a firewall -- Sleepy network-layer authentication service for IPSEC -- Certified electronic mail -- Distributed proctoring -- Merging heterogeneous security orderings -- CSP and anonymity -- Formal semantics for authentication logics -- Threat scenarios as a means to formally develop secure systems -- The impact of multilevel security on database buffer management -- Enhancing the controlled disclosure of sensitive information -- Secure concurrency control in MLS databases with two versions of data -- Panel session: Authors' rights and copyright protection -- Modelling a public-key infrastructure -- Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96. The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK7451

Development of a Secure Electronic Marketplace for Europe -- Lightweight micro-cash for the internet -- Digital payment systems with passive anonymity-revoking trustees -- An authorization model for workflows -- Role hierarchies and constraints for lattice-based access controls -- A multilevel security model for distributed object systems -- An authorization model for federated systems -- Security for mobile agents: Authentication and state appraisal -- Server-Supported Signatures -- Limitations of the approach of solving a network's security problems with a firewall -- Sleepy network-layer authentication service for IPSEC -- Certified electronic mail -- Distributed proctoring -- Merging heterogeneous security orderings -- CSP and anonymity -- Formal semantics for authentication logics -- Threat scenarios as a means to formally develop secure systems -- The impact of multilevel security on database buffer management -- Enhancing the controlled disclosure of sensitive information -- Secure concurrency control in MLS databases with two versions of data -- Panel session: Authors' rights and copyright protection -- Modelling a public-key infrastructure -- Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches.

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96. The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha