4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings /
First Statement of Responsibility
Elisa Bertino ... [et al.], eds.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
New York :
Name of Publisher, Distributor, etc.
Springer,
Date of Publication, Distribution, etc.
1996.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
x, 364 p. :
Other Physical Details
ill. ;
Dimensions
24 cm.
SERIES
Series Title
Lecture notes in computer science ;
Volume Designation
1146
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index.
CONTENTS NOTE
Text of Note
Development of a secure electronic marketplace for Europe / M. Waidner -- Light-weight micro-cash payment for the Internet / W. Mao -- Digital payment systems with passive anonymity-revoking trustees / J. Camenisch, U. Maurer, M. Stadler -- An authorization model for workflows / V. Atluri, W.-K. Huang -- Role hierarchies and constraints for lattice-based access controls / R. Sandhu -- A multilevel security model for distributed object systems / V. Nicomette, Y. Deswarte -- An authorization model for federated systems / S. De Capitani di Vimercati, P. Samarati -- Security for mobile agents : authentication and state appraisal / W. Farmer, J. Guttman, V. Swarup -- Server-supported signatures / N. Asokan, G. Tsudik, M. Waidner -- Sleepy network-layer authentication service for IPSEC / S.F. Wu -- Certified electronic mail / J. Zhou, D. Gollmann -- Distributed proctoring / B. Schneier, J. Kelsey, J. Walker -- Merging heterogeneous security orderings / P. Bonatti, M.L. Sapino, V.S. Subrahmanian -- CSP and anonymity / S. Schneider, A. Sidiropoulos -- Formal semantics for authentication logics / G. Wedel, V. Kessler -- Threat scenarios as a means to formally develop secure systems / V. Lotz -- The impact of multilevel security on database buffer management / A. Warner ... [et al.] -- Enhancing the controlled disclosure of sensitive information / D.G. Marks, A. Motro, S. Jajodia -- Secure concurrency control in MLS databases with two versions of data / L.V. Mancini, I. Ray -- Modelling a public-key infrastructure / U. Maurer -- Analyzing the Needham-Schroeder public-key protocol : a comparison of two approaches / C.A. Meadows.
0
TOPICAL NAME USED AS SUBJECT
Computer security, Congresses.
DEWEY DECIMAL CLASSIFICATION
Number
005
.
8
Edition
20
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA76
.
9
.
A25
Book number
E98
1996
PERSONAL NAME - ALTERNATIVE RESPONSIBILITY
Bertino, Elisa.
CORPORATE BODY NAME - PRIMARY RESPONSIBILITY
European Symposium on Research in Computer Security(4th :1996 :, Rome, Italy)