Computer Security - Esorics 96. 4Th European Symposium On Research In Computer Security. Rome, Italy, September 25-27, 1996. Proceedings

Berlin : Springer, 1996
Abstract: IL VOLUME RIPORTA I RISULTATI DEL SIMPOSIO INTERNAZIONALE CHE SI è TENUTO A TOLOSA NEL 1990 SULLA SICUREZZA NELL'AREA DEI COMPUTER. ESSO FA PARTE DI INCONTRI CHE VENGONO ORGANIZZATI OGNI DUE ANNI DALL'EUROPEAN SYMPOSIUM ON RESEARCH IN COMPUTER SECURITY (ESORICS) IN DIVERSI PAESI EUROPEI. IL VOLUME RACCOGLIE GLI STUDI PREDISPOSTI DAI PAESI EUROPEI CHE DESCRIVONO I SISTEMI INFORMATIVI E I LORO METODI DI SICUREZZA. PARTICOLARE ATTENZIONE è DEDICATA A INTERNET
Cover  Computer Security - Esorics 96. 4Th European Symposium On Research In Computer Security. Rome, Italy, September 25-27, 1996. Proceedings
Items: 1
Loans: 0
Reservations: 0
Field Value
Description Computer Security - Esorics 96. 4Th European Symposium On Research In Computer Security. Rome, Italy, September 25-27, 1996. Proceedings. - Berlin : Springer, 1996. - Pp. X-364 ; .24 cm. - (Lecture Notes In Computer Science)
Notes
Bibliografia: Alla Fine Di Ogni Saggio. - Maurer Ueli,Waidner Michael,Mao Wenbo,Camenisch Jan - Maurer Ueli - Stadler Markus,Atluri Vijayalakshrni - Huang Wei,Sandhu Ravi,Nicomette Vincent - Deswarte Yves,De Capitani Di Vimercati Sabrina - Samarati Pierangela,Farmer William M,Asokan N,Zatti Stefano,Wu Shyhtsun F,Zhou Jianying - Gollmann Dieter,Schneier Bruce - Kelsey John - Walker Jay,Bonatti P,Schneider Steve - Sidiropoulos Abraham,Wedel Gabriele - Kessler Volker,Lotz Wolkmar,Warner Andrew - Li Qiang - Keefe Thomas - Pal Shankar,Mancini Luigi V - Ray Indrajit,Eizenberg Gerard,Meadows Catherine A
Key Infrastructure 325-350 Pp.,Development Of A Secure Electronic Marketplace For Europe 1-14 Pp.,Cash Payment For The Internet 15-32 Pp.,Revoking Trustees 33-43 Pp.,An Authorization Model For Workflows 44-64 Pp.,Based Access Controls 65-79 Pp.,A Multilevel Security Model For Distributed Object Systems 80-98 Pp.,An Authorization Model For Federated Systems 99-117 Pp.,Guttman, Joshua D - Swarup, Vipin - Security For Mobile Agents: Authentication And State Appraisal. 118-130 Pp.,Tsudik, G - Waidner, M. - Server-Supported Signatures. 131-143 Pp.,Pabel: Limitations Of The Approach Of Solving A Network's Security Problem With A Firewall 144-145 Pp.,Layer Authentication Service For Ipsec 146-159 Pp.,Certified Electronic Mail 160-171 Pp.,Distributed Proctoring 172-182 Pp.,Sapino, M L. - Subrahmanian, V.S. - Merging Heterogeneous Security Orderings. 183-197 Pp.,Csp And Anonymity 198-218 Pp.,Formal Semantics For Authentication Logics 219-241 Pp.,Threat Scenarios As A Means To Formally Develop Secure Systems 242-265 Pp.,The Impact Of Multilevel Security On Database Buffer Management 266-289 Pp.,Marks, Donald G Motro, Amihai - Jajodia, Sushil - Enhancing The Controlled Discosure Of Sensitive Information. 290-303 Pp.,Secure Concurrency Control In Mls Databases With Two Versions Of Data 304-323 Pp.,Panel: Authors' Rights And Copyright Protection 324-324 Pp.,Key Protocol: A Comparison Of Two Approaches 351-364 Pp.
Series
Keys
Publishing location
Editor
ID file 6721
Library Inv. Ubi. Collocation State Status Reservations
Biblio Conf 0080504 Biblioteca LA / 996 / 277 Available In library None
Extend the research of the resource