000 02949fam a2200349 a 4500
001 1880417
003 BD-DhUL
005 20140807155149.0
008 960828s1996 gw b 101 0 eng
010 _a 96043202
020 _a3540617701 (alk. paper)
035 _a(OCoLC)35364818
035 _a(OCoLC)ocm35364818
035 _a(NNC)1880417
040 _aDLC
_cDLC
_dNNC
_dOrLoB-B
_dBD-DhUL
050 0 0 _aQA76.9.A25
_bE98 1996
082 0 0 _a005.8
_220
_bCOM
111 2 _aEuropean Symposium on Research in Computer Security
_n(4th :
_d1996 :
_cRome, Italy)
245 1 0 _aComputer security, ESORICS 96 :
_b4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings /
_cElisa Bertino ... [et al.], eds.
260 _aBerlin ;
_aNew York :
_bSpringer,
_c1996.
263 _a9610
300 _ax, 364 p. :
_bill. ;
_c24 cm.
490 1 _aLcture notes in computer science ;
_v1146
504 _aIncludes bibliographical references and index.
505 0 0 _tDevelopment of a Secure Electronic Marketplace for Europe /
_rM. Waidner --
_tLight-Weight Micro-cash Payment for the Internet /
_rW. Mao --
_tDigital Payment Systems with Passive Anonymity-Revoking Trustees /
_rJ. Camenisch, U. Maurer and M. Stadler --
_tAn Authorization Model for Workflows /
_rV. Atluri and W.-K. Huang --
_tRole Hierarchies and Constraints for Lattice-Based Access Controls /
_rR. Sandhu --
_tA Multilevel Security Model for Distributed Object Systems /
_rV. Nicomette and Y. Deswarte --
_tAn Authorization Model for Federated Systems /
_rS. De Capitani di Vimercati and P. Samarati --
_tSecurity for Mobile Agents: Authentication and State Appraisal /
_rW. Farmer, J. Guttman and V. Swarup --
_tServer-Supported Signatures /
_rN. Asokan, G. Tsudik and M. Waidner --
_tSleepy Network-Layer Authentication Service for IPSEC /
_rS. F. Wu --
_tCertified Electronic Mail /
_rJ. Zhou and D. Gollmann --
_tDistributed Proctoring /
_rB. Schneier, J. Kelsey and J. Walker --
505 8 0 _tMerging Heterogeneous Security Orderings /
_rP. Bonatti, M. L. Sapino and V. S. Subrahmanian --
_tCSP and Anonymity /
_rS. Schneider and A. Sidiropoulos --
_tFormal Semantics for Authentication Logics /
_rG. Wedel and V. Kessler --
_tThreat Scenarios as a Means to Formally Develop Secure Systems /
_rV. Lotz --
_tThe Impact of Multilevel Security on Database Buffer Management /
_rA. Warner, Q. Li, T. Keefe and S. Pal --
_tEnhancing the Controlled Disclosure of Sensitive Information /
_rD. G. Marks, A. Motro and S. Jajodia --
_tSecure Concurrency Control in MLS Databases with Two Versions of Data /
_rL. V. Mancini and I. Ray --
_tModelling a Public-Key Infrastructure /
_rU. Maurer --
_tAnalyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches /
_rC. A. Meadows.
650 0 _aComputer security
_vCongresses.
700 1 _aBertino, Elisa.
830 0 _aLecture notes in computer science ;
_v1146.
900 _aAUTH
_bTOC
942 _2ddc
_cBK
999 _c1194
_d1194