Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 1146

ISBN: 3540617701, 9783540617709

Size: 3 MB (3506368 bytes)

Pages: 377/376

File format:

Language:

Publishing Year:

Category: Tags: , , , , ,

Michael Waidner (auth.), Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo (eds.)3540617701, 9783540617709

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS ’96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA ’96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Table of contents :
Development of a Secure Electronic Marketplace for Europe….Pages 1-14
Lightweight micro-cash for the internet….Pages 15-32
Digital payment systems with passive anonymity-revoking trustees….Pages 33-43
An authorization model for workflows….Pages 44-64
Role hierarchies and constraints for lattice-based access controls….Pages 65-79
A multilevel security model for distributed object systems….Pages 80-98
An authorization model for federated systems….Pages 99-117
Security for mobile agents: Authentication and state appraisal….Pages 118-130
Server-Supported Signatures….Pages 131-143
Limitations of the approach of solving a network’s security problems with a firewall….Pages 144-145
Sleepy network-layer authentication service for IPSEC….Pages 146-159
Certified electronic mail….Pages 160-171
Distributed proctoring….Pages 172-182
Merging heterogeneous security orderings….Pages 183-197
CSP and anonymity….Pages 198-218
Formal semantics for authentication logics….Pages 219-241
Threat scenarios as a means to formally develop secure systems….Pages 242-265
The impact of multilevel security on database buffer management….Pages 266-289
Enhancing the controlled disclosure of sensitive information….Pages 290-303
Secure concurrency control in MLS databases with two versions of data….Pages 304-323
Panel session: Authors’ rights and copyright protection….Pages 324-324
Modelling a public-key infrastructure….Pages 325-350
Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches….Pages 351-364

Reviews

There are no reviews yet.

Be the first to review “Computer Security — ESORICS 96: 4th European Symposium on Research in Computer Security Rome, Italy, September 25–27, 1996 Proceedings”
Shopping Cart
Scroll to Top