Computer Security - ESORICS 2000 [electronic resource] : 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000. Proceedings / edited by Frédéric Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner.

By: Cuppens, Frédéric [editor.]Contributor(s): Deswarte, Yves [editor.] | Gollmann, Dieter [editor.] | Waidner, Michael [editor.] | SpringerLink (Online service)Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science: 1895Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000Description: X, 330 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540452997Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Logic design | Information Systems | Computer Science | Operating Systems | Data Encryption | Computer Communication Networks | Logics and Meanings of Programs | Management of Computing and Information SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.43 LOC classification: QA76.76.O63Online resources: Click here to access online
Contents:
Personal Devices and Smart Cards -- Checking Secure Interactions of Smart Card Applets -- Verification of a Formal Security Model for Multiapplicative Smart Cards -- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications -- Electronic Commerce Protocols -- Secure Anonymous Signature-Based Transactions -- Metering Schemes for General Access Structures -- Access Control -- A Typed Access Control Model for CORBA -- Safety Analysis of the Dynamic-Typed Access Matrix Model -- A Formal Model for Role-Based Access Control Using Graph Transformation -- Protocol Verification -- A Formal Semantics for SPKI -- Formal Verification of Cardholder Registration in SET -- Automating Data Independence -- Internet Security -- Finding a Connection Chain for Tracing Intruders -- A Full Bandwidth ATM Firewall -- Security Property Analysis -- Analysing Time Dependent Security Properties in CSP Using PVS -- Unwinding Possibilistic Security Properties -- Authentication and Confidentiality via IPsec -- Mobile Agents -- A Security Framework for a Mobile Agent System -- A Distributed Access Control Model for Java -- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code.
In: Springer eBooksSummary: his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
No physical items for this record

Personal Devices and Smart Cards -- Checking Secure Interactions of Smart Card Applets -- Verification of a Formal Security Model for Multiapplicative Smart Cards -- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications -- Electronic Commerce Protocols -- Secure Anonymous Signature-Based Transactions -- Metering Schemes for General Access Structures -- Access Control -- A Typed Access Control Model for CORBA -- Safety Analysis of the Dynamic-Typed Access Matrix Model -- A Formal Model for Role-Based Access Control Using Graph Transformation -- Protocol Verification -- A Formal Semantics for SPKI -- Formal Verification of Cardholder Registration in SET -- Automating Data Independence -- Internet Security -- Finding a Connection Chain for Tracing Intruders -- A Full Bandwidth ATM Firewall -- Security Property Analysis -- Analysing Time Dependent Security Properties in CSP Using PVS -- Unwinding Possibilistic Security Properties -- Authentication and Confidentiality via IPsec -- Mobile Agents -- A Security Framework for a Mobile Agent System -- A Distributed Access Control Model for Java -- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code.

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

There are no comments on this title.

to post a comment.

Implemented and Maintained by Biju Patnaik Central Library.
For any Suggestions/Query Contact to library or Email: library@nitrkl.ac.in OR bpcl-cir@nitrkl.ac.in. Ph:91+6612462103
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha