Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : European Symposium on Research in Computer Security (6 ; 2000 ; Toulouse, France)
Titre(s) : Computer security--ESORICS 2000 [Texte électronique] : 6th European Symposium on Research in Computer Security, Toulouse, France, October 4-6, 2000 : proceedings / Frédéric Cuppens [and others] (eds.)
Publication : Berlin ; New York : Springer, 2000
Description matérielle : 1 online resource (323 pages)
Collection : Lecture notes in computer science ; 1895
Note(s) : Includes bibliographical references and index
His book presents the refereed proceedings of the 6th European Symposium on Research
in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The
19 revised full papers presented were carefully reviewed and selected from a total
of 75 submissions. The papers are organized in sections on personal devices and smart
cards, electronic commerce protocols, access control, protocol verification, Internet
security, security property analysis, and mobile agents
Autre(s) auteur(s) : Cuppens, Frédéric. Fonction indéterminée
Sujet(s) : Informatique
Systèmes d'exploitation (ordinateurs)
Systèmes informatiques -- Mesures de sûreté
Chiffrement (informatique)
Réseaux d'ordinateurs
Indice(s) Dewey :
005.8 (23e éd.) = Sécurité informatique
Identifiants, prix et caractéristiques : ISBN 9783540452997
Identifiant de la notice : ark:/12148/cb44690624k
Notice n° :
FRBNF44690624
(notice reprise d'un réservoir extérieur)
Table des matières : Personal Devices and Smart Cards ; Checking Secure Interactions of Smart Card Applets
; Verification of a Formal Security Model for Multiapplicative Smart Cards ; How
Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation
and the Granularity of Access Control in Communications ; Electronic Commerce Protocols
; Secure Anonymous Signature-Based Transactions ; Metering Schemes for General Access
Structures ; Access Control ; A Typed Access Control Model for CORBA ; Safety Analysis
of the Dynamic-Typed Access Matrix Model ; A Formal Model for Role-Based Access Control
Using Graph Transformation ; Protocol Verification ; A Formal Semantics for SPKI
; Formal Verification of Cardholder Registration in SET ; Automating Data Independence
; Internet Security ; Finding a Connection Chain for Tracing Intruders ; A Full
Bandwidth ATM Firewall ; Security Property Analysis ; Analysing Time Dependent Security
Properties in CSP Using PVS ; Unwinding P