Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Computer Security - ESORICS 2000

6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings
BuchKartoniert, Paperback
330 Seiten
Englisch
Springererschienen am20.09.2000
his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions.mehr
Verfügbare Formate
BuchKartoniert, Paperback
EUR53,49
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49

Produkt

Klappentexthis book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000.The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions.
Details
ISBN/GTIN978-3-540-41031-7
ProduktartBuch
EinbandartKartoniert, Paperback
Verlag
Erscheinungsjahr2000
Erscheinungsdatum20.09.2000
Seiten330 Seiten
SpracheEnglisch
Gewicht481 g
IllustrationenX, 330 p.
Artikel-Nr.10505556

Inhalt/Kritik

Inhaltsverzeichnis
Personal Devices and Smart Cards.- Checking Secure Interactions of Smart Card Applets.- Verification of a Formal Security Model for Multiapplicative Smart Cards.- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications.- Electronic Commerce Protocols.- Secure Anonymous Signature-Based Transactions.- Metering Schemes for General Access Structures.- Access Control.- A Typed Access Control Model for CORBA.- Safety Analysis of the Dynamic-Typed Access Matrix Model.- A Formal Model for Role-Based Access Control Using Graph Transformation.- Protocol Verification.- A Formal Semantics for SPKI.- Formal Verification of Cardholder Registration in SET.- Automating Data Independence.- Internet Security.- Finding a Connection Chain for Tracing Intruders.- A Full Bandwidth ATM Firewall.- Security Property Analysis.- Analysing Time Dependent Security Properties in CSP Using PVS.- Unwinding Possibilistic Security Properties.- Authentication and Confidentiality via IPsec.- Mobile Agents.- A Security Framework for a Mobile Agent System.- A Distributed Access Control Model for Java.- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code.mehr

Schlagworte