Muutke küpsiste eelistusi

Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings 2000 ed. [Pehme köide]

Edited by , Edited by , Edited by , Edited by
  • Formaat: Paperback / softback, 330 pages, kõrgus x laius: 235x155 mm, kaal: 1060 g, X, 330 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 1895
  • Ilmumisaeg: 20-Sep-2000
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540410317
  • ISBN-13: 9783540410317
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 330 pages, kõrgus x laius: 235x155 mm, kaal: 1060 g, X, 330 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 1895
  • Ilmumisaeg: 20-Sep-2000
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540410317
  • ISBN-13: 9783540410317
his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Muu info

Springer Book Archives
Personal Devices and Smart Cards Checking Secure Interactions of Smart Card Applets 1(16) P. Bieber J. Cazin P. Girard J.-L. Lanet V. Wiels G. Zanon Verification of a Formal Security Model for Multiapplicative Smart Cards 17(20) Gerhard Schellhorn Wolfgang Reif Axel Schairer Paul Karger Vernon Austel David Toll How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications 37(18) Kai Rannenberg Electronic Commerce Protocols Secure Anonymous Signature-Based Transactions 55(17) Els Van Herreweghen Metering Schemes for General Access Structures 72(16) Barbara Masucci Douglas R. Stinson Access Control A Typed Access Control Model for CORBA 88(18) Gerald Brose Safety Analysis of the Dynamic-Typed Access Matrix Model 106(16) Masakazu Soshi A Formal Model for Role-Based Access Control Using Graph Transformation 122(18) Manuel Koch Luigi V. Mancini Francesco Parisi-Presicce Protocol Verification A Formal Semantics for SPKI 140(19) Jon Howell David Kotz Formal Verification of Cardholder Registration in SET 159(16) Giampaolo Bella Fabio Massacci Lawrence C. Paulson Piero Tramontano Automating Data Independence 175(16) P. J. Broadfoot G. Lowe A. W. Roscoe Internet Security Finding a Connection Chain for Tracing Intruders 191(15) Kunikazu Yoda Hiroaki Etoh A Full Bandwidth ATM Firewall 206(16) Olivier Paul Maryline Laurent Sylvian Gombault Security Property Analysis Analysing Time Dependent Security Properties in CSP Using PVS 222(16) Neil Evans Steve Schneider Unwinding Possibilistic Security Properties 238(17) Heiko Mantel Authentication and Confidentiality via IPsec 255(18) Joshau D. Guttman Amy L. Herzog F. Javier Thayer Mobile Agents A Security Framework for a Mobile Agent System 273(18) Ciaran Bryce A Distributed Access Control Model for Java 291(18) Refik Molva Yves Roudier Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code 309(16) Ian Welch Robert J. Stroud Author Index 325