Library Logo
Normal view MARC view ISBD view

Computer security, ESORICS 96 : 4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings /

by (4th : European Symposium on Research in Computer Security 1996 : Rome, Italy); Bertino, Elisa.
Material type: materialTypeLabelBookSeries: Lecture notes in computer science: 1146.Publisher: Berlin ; New York : Springer, 1996Description: x, 364 p. : ill. ; 24 cm.ISBN: 3540617701 (alk. paper).Subject(s): Computer security -- Congresses
Contents:
Development of a Secure Electronic Marketplace for Europe / M. Waidner -- Light-Weight Micro-cash Payment for the Internet / W. Mao -- Digital Payment Systems with Passive Anonymity-Revoking Trustees / J. Camenisch, U. Maurer and M. Stadler -- An Authorization Model for Workflows / V. Atluri and W.-K. Huang -- Role Hierarchies and Constraints for Lattice-Based Access Controls / R. Sandhu -- A Multilevel Security Model for Distributed Object Systems / V. Nicomette and Y. Deswarte -- An Authorization Model for Federated Systems / S. De Capitani di Vimercati and P. Samarati -- Security for Mobile Agents: Authentication and State Appraisal / W. Farmer, J. Guttman and V. Swarup -- Server-Supported Signatures / N. Asokan, G. Tsudik and M. Waidner -- Sleepy Network-Layer Authentication Service for IPSEC / S. F. Wu -- Certified Electronic Mail / J. Zhou and D. Gollmann -- Distributed Proctoring / B. Schneier, J. Kelsey and J. Walker --
Merging Heterogeneous Security Orderings / P. Bonatti, M. L. Sapino and V. S. Subrahmanian -- CSP and Anonymity / S. Schneider and A. Sidiropoulos -- Formal Semantics for Authentication Logics / G. Wedel and V. Kessler -- Threat Scenarios as a Means to Formally Develop Secure Systems / V. Lotz -- The Impact of Multilevel Security on Database Buffer Management / A. Warner, Q. Li, T. Keefe and S. Pal -- Enhancing the Controlled Disclosure of Sensitive Information / D. G. Marks, A. Motro and S. Jajodia -- Secure Concurrency Control in MLS Databases with Two Versions of Data / L. V. Mancini and I. Ray -- Modelling a Public-Key Infrastructure / U. Maurer -- Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches / C. A. Meadows.
Tags from this library: No tags from this library for this title. Add tag(s)
Log in to add tags.
    average rating: 0.0 (0 votes)
Item type Current location Collection Call number Copy number Status Date due Barcode
Books Books Dhaka University Science Library
General Stacks
Non Fiction 005.8 COM (Browse shelf) 1 Available 372184
Books Books Dhaka University Science Library
General Stacks
Non Fiction 005.8 COM (Browse shelf) 3 Available 387646
Browsing Dhaka University Science Library Shelves , Shelving location: General Stacks , Collection code: Non Fiction Close shelf browser
005.8 BHI Information security : 005.8 CLO Cloud computing security : 005.8 CLO Cloud computing security : 005.8 COM Computer security, ESORICS 96 : 005.8 COM Computer security, ESORICS 96 : 005.8 COP Protection and security on the information superhighway / 005.8 CYB Cyber security, cyber crime and cyber forensics :

Includes bibliographical references and index.

Development of a Secure Electronic Marketplace for Europe / M. Waidner -- Light-Weight Micro-cash Payment for the Internet / W. Mao -- Digital Payment Systems with Passive Anonymity-Revoking Trustees / J. Camenisch, U. Maurer and M. Stadler -- An Authorization Model for Workflows / V. Atluri and W.-K. Huang -- Role Hierarchies and Constraints for Lattice-Based Access Controls / R. Sandhu -- A Multilevel Security Model for Distributed Object Systems / V. Nicomette and Y. Deswarte -- An Authorization Model for Federated Systems / S. De Capitani di Vimercati and P. Samarati -- Security for Mobile Agents: Authentication and State Appraisal / W. Farmer, J. Guttman and V. Swarup -- Server-Supported Signatures / N. Asokan, G. Tsudik and M. Waidner -- Sleepy Network-Layer Authentication Service for IPSEC / S. F. Wu -- Certified Electronic Mail / J. Zhou and D. Gollmann -- Distributed Proctoring / B. Schneier, J. Kelsey and J. Walker --

Merging Heterogeneous Security Orderings / P. Bonatti, M. L. Sapino and V. S. Subrahmanian -- CSP and Anonymity / S. Schneider and A. Sidiropoulos -- Formal Semantics for Authentication Logics / G. Wedel and V. Kessler -- Threat Scenarios as a Means to Formally Develop Secure Systems / V. Lotz -- The Impact of Multilevel Security on Database Buffer Management / A. Warner, Q. Li, T. Keefe and S. Pal -- Enhancing the Controlled Disclosure of Sensitive Information / D. G. Marks, A. Motro and S. Jajodia -- Secure Concurrency Control in MLS Databases with Two Versions of Data / L. V. Mancini and I. Ray -- Modelling a Public-Key Infrastructure / U. Maurer -- Analyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches / C. A. Meadows.

There are no comments for this item.

Log in to your account to post a comment.
Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login