Online Library TheLib.net » Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings
cover of the book Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings

Ebook: Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings

00
27.01.2024
0
0

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.




This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.


This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.
Content:
Front Matter....Pages -
Development of a Secure Electronic Marketplace for Europe....Pages 1-14
Lightweight micro-cash for the internet....Pages 15-32
Digital payment systems with passive anonymity-revoking trustees....Pages 33-43
An authorization model for workflows....Pages 44-64
Role hierarchies and constraints for lattice-based access controls....Pages 65-79
A multilevel security model for distributed object systems....Pages 80-98
An authorization model for federated systems....Pages 99-117
Security for mobile agents: Authentication and state appraisal....Pages 118-130
Server-Supported Signatures....Pages 131-143
Limitations of the approach of solving a network's security problems with a firewall....Pages 144-145
Sleepy network-layer authentication service for IPSEC....Pages 146-159
Certified electronic mail....Pages 160-171
Distributed proctoring....Pages 172-182
Merging heterogeneous security orderings....Pages 183-197
CSP and anonymity....Pages 198-218
Formal semantics for authentication logics....Pages 219-241
Threat scenarios as a means to formally develop secure systems....Pages 242-265
The impact of multilevel security on database buffer management....Pages 266-289
Enhancing the controlled disclosure of sensitive information....Pages 290-303
Secure concurrency control in MLS databases with two versions of data....Pages 304-323
Panel session: Authors' rights and copyright protection....Pages 324-324
Modelling a public-key infrastructure....Pages 325-350
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches....Pages 351-364
Back Matter....Pages -


This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.
Content:
Front Matter....Pages -
Development of a Secure Electronic Marketplace for Europe....Pages 1-14
Lightweight micro-cash for the internet....Pages 15-32
Digital payment systems with passive anonymity-revoking trustees....Pages 33-43
An authorization model for workflows....Pages 44-64
Role hierarchies and constraints for lattice-based access controls....Pages 65-79
A multilevel security model for distributed object systems....Pages 80-98
An authorization model for federated systems....Pages 99-117
Security for mobile agents: Authentication and state appraisal....Pages 118-130
Server-Supported Signatures....Pages 131-143
Limitations of the approach of solving a network's security problems with a firewall....Pages 144-145
Sleepy network-layer authentication service for IPSEC....Pages 146-159
Certified electronic mail....Pages 160-171
Distributed proctoring....Pages 172-182
Merging heterogeneous security orderings....Pages 183-197
CSP and anonymity....Pages 198-218
Formal semantics for authentication logics....Pages 219-241
Threat scenarios as a means to formally develop secure systems....Pages 242-265
The impact of multilevel security on database buffer management....Pages 266-289
Enhancing the controlled disclosure of sensitive information....Pages 290-303
Secure concurrency control in MLS databases with two versions of data....Pages 304-323
Panel session: Authors' rights and copyright protection....Pages 324-324
Modelling a public-key infrastructure....Pages 325-350
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches....Pages 351-364
Back Matter....Pages -
....
Download the book Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings for free or read online
Read Download
Continue reading on any device:
QR code
Last viewed books
Related books
Comments (0)
reload, if the code cannot be seen