Muutke küpsiste eelistusi

E-raamat: Computer Security - ESORICS 2000: 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings

Edited by , Edited by , Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 1895
  • Ilmumisaeg: 31-Dec-2006
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540452997
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 1895
  • Ilmumisaeg: 31-Dec-2006
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540452997

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents.

Muu info

Springer Book Archives
Personal Devices and Smart Cards Checking Secure Interactions of Smart Card Applets 1(16) P. Bieber J. Cazin P. Girard J.-L. Lanet V. Wiels G. Zanon Verification of a Formal Security Model for Multiapplicative Smart Cards 17(20) Gerhard Schellhorn Wolfgang Reif Axel Schairer Paul Karger Vernon Austel David Toll How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications 37(18) Kai Rannenberg Electronic Commerce Protocols Secure Anonymous Signature-Based Transactions 55(17) Els Van Herreweghen Metering Schemes for General Access Structures 72(16) Barbara Masucci Douglas R. Stinson Access Control A Typed Access Control Model for CORBA 88(18) Gerald Brose Safety Analysis of the Dynamic-Typed Access Matrix Model 106(16) Masakazu Soshi A Formal Model for Role-Based Access Control Using Graph Transformation 122(18) Manuel Koch Luigi V. Mancini Francesco Parisi-Presicce Protocol Verification A Formal Semantics for SPKI 140(19) Jon Howell David Kotz Formal Verification of Cardholder Registration in SET 159(16) Giampaolo Bella Fabio Massacci Lawrence C. Paulson Piero Tramontano Automating Data Independence 175(16) P. J. Broadfoot G. Lowe A. W. Roscoe Internet Security Finding a Connection Chain for Tracing Intruders 191(15) Kunikazu Yoda Hiroaki Etoh A Full Bandwidth ATM Firewall 206(16) Olivier Paul Maryline Laurent Sylvian Gombault Security Property Analysis Analysing Time Dependent Security Properties in CSP Using PVS 222(16) Neil Evans Steve Schneider Unwinding Possibilistic Security Properties 238(17) Heiko Mantel Authentication and Confidentiality via IPsec 255(18) Joshau D. Guttman Amy L. Herzog F. Javier Thayer Mobile Agents A Security Framework for a Mobile Agent System 273(18) Ciaran Bryce A Distributed Access Control Model for Java 291(18) Refik Molva Yves Roudier Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code 309(16) Ian Welch Robert J. Stroud Author Index 325