000 | 02949fam a2200349 a 4500 | ||
---|---|---|---|
001 | 1880417 | ||
003 | BD-DhUL | ||
005 | 20140807155149.0 | ||
008 | 960828s1996 gw b 101 0 eng | ||
010 | _a 96043202 | ||
020 | _a3540617701 (alk. paper) | ||
035 | _a(OCoLC)35364818 | ||
035 | _a(OCoLC)ocm35364818 | ||
035 | _a(NNC)1880417 | ||
040 |
_aDLC _cDLC _dNNC _dOrLoB-B _dBD-DhUL |
||
050 | 0 | 0 |
_aQA76.9.A25 _bE98 1996 |
082 | 0 | 0 |
_a005.8 _220 _bCOM |
111 | 2 |
_aEuropean Symposium on Research in Computer Security _n(4th : _d1996 : _cRome, Italy) |
|
245 | 1 | 0 |
_aComputer security, ESORICS 96 : _b4th European Symposium on Research in Computer Security, Rome, Italy, September 25-27, 1996 : proceedings / _cElisa Bertino ... [et al.], eds. |
260 |
_aBerlin ; _aNew York : _bSpringer, _c1996. |
||
263 | _a9610 | ||
300 |
_ax, 364 p. : _bill. ; _c24 cm. |
||
490 | 1 |
_aLcture notes in computer science ; _v1146 |
|
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | 0 |
_tDevelopment of a Secure Electronic Marketplace for Europe / _rM. Waidner -- _tLight-Weight Micro-cash Payment for the Internet / _rW. Mao -- _tDigital Payment Systems with Passive Anonymity-Revoking Trustees / _rJ. Camenisch, U. Maurer and M. Stadler -- _tAn Authorization Model for Workflows / _rV. Atluri and W.-K. Huang -- _tRole Hierarchies and Constraints for Lattice-Based Access Controls / _rR. Sandhu -- _tA Multilevel Security Model for Distributed Object Systems / _rV. Nicomette and Y. Deswarte -- _tAn Authorization Model for Federated Systems / _rS. De Capitani di Vimercati and P. Samarati -- _tSecurity for Mobile Agents: Authentication and State Appraisal / _rW. Farmer, J. Guttman and V. Swarup -- _tServer-Supported Signatures / _rN. Asokan, G. Tsudik and M. Waidner -- _tSleepy Network-Layer Authentication Service for IPSEC / _rS. F. Wu -- _tCertified Electronic Mail / _rJ. Zhou and D. Gollmann -- _tDistributed Proctoring / _rB. Schneier, J. Kelsey and J. Walker -- |
505 | 8 | 0 |
_tMerging Heterogeneous Security Orderings / _rP. Bonatti, M. L. Sapino and V. S. Subrahmanian -- _tCSP and Anonymity / _rS. Schneider and A. Sidiropoulos -- _tFormal Semantics for Authentication Logics / _rG. Wedel and V. Kessler -- _tThreat Scenarios as a Means to Formally Develop Secure Systems / _rV. Lotz -- _tThe Impact of Multilevel Security on Database Buffer Management / _rA. Warner, Q. Li, T. Keefe and S. Pal -- _tEnhancing the Controlled Disclosure of Sensitive Information / _rD. G. Marks, A. Motro and S. Jajodia -- _tSecure Concurrency Control in MLS Databases with Two Versions of Data / _rL. V. Mancini and I. Ray -- _tModelling a Public-Key Infrastructure / _rU. Maurer -- _tAnalyzing the Needham-Schroeder Public-Key Protocol: A Comparison of Two Approaches / _rC. A. Meadows. |
650 | 0 |
_aComputer security _vCongresses. |
|
700 | 1 | _aBertino, Elisa. | |
830 | 0 |
_aLecture notes in computer science ; _v1146. |
|
900 |
_aAUTH _bTOC |
||
942 |
_2ddc _cBK |
||
999 |
_c1194 _d1194 |