Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)3540208305, 9783540208303
Table of contents :
Front Matter….Pages –
Introduction (Transcript)….Pages 1-1
Keynote Address….Pages 2-4
Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties….Pages 5-19
Is Entity Authentication Necessary?….Pages 20-33
A Structured Operational Modelling of the Dolev-Yao Threat Model….Pages 34-46
On Trust Establishment in Mobile Ad-Hoc Networks….Pages 47-66
Legally Authorized and Unauthorized Digital Evidence….Pages 67-73
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processing….Pages 74-95
Contractual Access Control….Pages 96-103
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks….Pages 104-119
Analyzing Delegation Properties….Pages 120-127
Combinatorial Optimization of Countermeasures against Illegal Copying….Pages 128-144
Protocols with Certified-Transfer Servers….Pages 145-157
An Architecture for an Adaptive Intrusion-Tolerant Server….Pages 158-178
Supporting Imprecise Delegation in KeyNote….Pages 179-188
Modeling Protocols for Secure Group Communications in Ad Hoc Networks….Pages 189-202
Delegation of Signalling Rights….Pages 203-214
Mobile IPv6 Security….Pages 215-234
Concluding Discussion: Accounting for Resources….Pages 235-241
Back to the Beginning….Pages 242-242
Back Matter….Pages –
Reviews
There are no reviews yet.