Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 1796

ISBN: 3540673814, 9783540673811

Size: 2 MB (1655441 bytes)

Pages: 232/239

File format:

Language:

Publishing Year:

Category: Tags: , , ,

Roger Needham (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)3540673814, 9783540673811

Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position – pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think “why, that is justso wrong”,then good. We’re waiting for your mail.

Table of contents :
Front Matter….Pages –
Keynote Address: The Changing Environment….Pages 1-5
Composing Security Properties….Pages 6-14
Auditing against Multiple Policies….Pages 15-20
Jikzi: A New Framework for Secure Publishing….Pages 21-36
Jikzi: A New Framework for Secure Publishing….Pages 37-47
Power and Permission in Security Systems….Pages 48-53
Power and Permission in Computer Systems….Pages 54-59
Auditing against Impossible Abstractions….Pages 60-64
What is Authentication?….Pages 65-72
Relations Between Secrets: The Yahalom Protocol….Pages 73-77
The Yahalom Protocol….Pages 78-84
Modelling Agents’ Knowledge Inductively….Pages 85-90
Modelling Agents’ Knowledge Inductively….Pages 91-94
Time-Lock Puzzle with Examinable Evidence of Unlocking Time….Pages 95-97
Time-Lock Puzzle with Examinable Evidence of Unlocking Time….Pages 98-102
Trust Management and Network Layer Security Protocols….Pages 103-108
Trust Management and Network Layer Security Protocols….Pages 109-118
Issues in Multicast Security….Pages 119-131
Issues in Multicast Security….Pages 132-139
Performance of Protocols….Pages 140-146
Performance of Protocols….Pages 147-152
Integrity-Aware PCBC Encryption Schemes….Pages 153-168
Integrity-Aware PCBC Encryption Schemes….Pages 169-171
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks….Pages 172-182
The Resurrecting Duckling….Pages 183-194
INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds….Pages 195-202
INTERNET-MARKs….Pages 203-207
Pictures Can’t Lie under Oath….Pages 208-211
Pictures Can’t Lie under Oath….Pages 212-218
Bob versus Bob – Good Guy/Bad Guy….Pages 219-223
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Security Protocols: 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings”
Shopping Cart
Scroll to Top