Computer security, ESORICS 96 : 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings /
by (4th : European Symposium on Research in Computer Security 1996 : Rome, Italy); Bertino, Elisa.
Material type: BookSeries: Lecture notes in computer science: 1146.Publisher: Berlin ; New York : Springer, 1996Description: x, 364 p. : ill. ; 24 cm.ISBN: 3540617701 (alk. paper).Subject(s): Computer security -- CongressesItem type | Current location | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
Books | Dhaka University Science Library General Stacks | Non Fiction | 005.8 COM (Browse shelf) | 1 | Available | 372184 | |
Books | Dhaka University Science Library General Stacks | Non Fiction | 005.8 COM (Browse shelf) | 3 | Available | 387646 |
Includes bibliographical references and index.
Development of a Secure Electronic Marketplace for Europe / M. Waidner -- Light-Weight Micro-cash Payment for the Internet / W. Mao -- Digital Payment Systems with Passive Anonymity-Revoking Trustees / J. Camenisch, U. Maurer and M. Stadler -- An Authorization Model for Workflows / V. Atluri and W.-K. Huang -- Role Hierarchies and Constraints for Lattice-Based Access Controls / R. Sandhu -- A Multilevel Security Model for Distributed Object Systems / V. Nicomette and Y. Deswarte -- An Authorization Model for Federated Systems / S. De Capitani di Vimercati and P. Samarati -- Security for Mobile Agents: Authentication and State Appraisal / W. Farmer, J. Guttman and V. Swarup -- Server-Supported Signatures / N. Asokan, G. Tsudik and M. Waidner -- Sleepy Network-Layer Authentication Service for IPSEC / S. F. Wu -- Certified Electronic Mail / J. Zhou and D. Gollmann -- Distributed Proctoring / B. Schneier, J. Kelsey and J. Walker --
Merging Heterogeneous Security Orderings / P. Bonatti, M. L. Sapino and V. S. Subrahmanian -- CSP and Anonymity / S. Schneider and A. Sidiropoulos -- Formal Semantics for Authentication Logics / G. Wedel and V. Kessler -- Threat Scenarios as a Means to Formally Develop Secure Systems / V. Lotz -- The Impact of Multilevel Security on Database Buffer Management / A. Warner, Q. Li, T. Keefe and S. Pal -- Enhancing the Controlled Disclosure of Sensitive Information / D. G. Marks, A. Motro and S. Jajodia -- Secure Concurrency Control in MLS Databases with Two Versions of Data / L. V. Mancini and I. Ray -- Modelling a Public-Key Infrastructure / U. Maurer -- Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches / C. A. Meadows.
There are no comments for this item.