Roger Needham (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe (eds.)3540673814, 9783540673811
Table of contents :
Front Matter….Pages –
Keynote Address: The Changing Environment….Pages 1-5
Composing Security Properties….Pages 6-14
Auditing against Multiple Policies….Pages 15-20
Jikzi: A New Framework for Secure Publishing….Pages 21-36
Jikzi: A New Framework for Secure Publishing….Pages 37-47
Power and Permission in Security Systems….Pages 48-53
Power and Permission in Computer Systems….Pages 54-59
Auditing against Impossible Abstractions….Pages 60-64
What is Authentication?….Pages 65-72
Relations Between Secrets: The Yahalom Protocol….Pages 73-77
The Yahalom Protocol….Pages 78-84
Modelling Agents’ Knowledge Inductively….Pages 85-90
Modelling Agents’ Knowledge Inductively….Pages 91-94
Time-Lock Puzzle with Examinable Evidence of Unlocking Time….Pages 95-97
Time-Lock Puzzle with Examinable Evidence of Unlocking Time….Pages 98-102
Trust Management and Network Layer Security Protocols….Pages 103-108
Trust Management and Network Layer Security Protocols….Pages 109-118
Issues in Multicast Security….Pages 119-131
Issues in Multicast Security….Pages 132-139
Performance of Protocols….Pages 140-146
Performance of Protocols….Pages 147-152
Integrity-Aware PCBC Encryption Schemes….Pages 153-168
Integrity-Aware PCBC Encryption Schemes….Pages 169-171
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks….Pages 172-182
The Resurrecting Duckling….Pages 183-194
INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds….Pages 195-202
INTERNET-MARKs….Pages 203-207
Pictures Can’t Lie under Oath….Pages 208-211
Pictures Can’t Lie under Oath….Pages 212-218
Bob versus Bob – Good Guy/Bad Guy….Pages 219-223
Back Matter….Pages –
Reviews
There are no reviews yet.