Zum Hauptinhalt springen
Nicht aus der Schweiz? Besuchen Sie lehmanns.de
Computer Security - ESORICS 94 -

Computer Security - ESORICS 94

Third European Symposium on Research in Computer Security, Brighton, United Kingdom, November 7 - 9, 1994. Proceedings

Dieter Gollmann (Herausgeber)

Online Resource
XIV, 474 Seiten
2005
Springer Berlin (Hersteller)
978-3-540-49034-0 (ISBN)
CHF 74,85 inkl. MwSt
  • Versand in 10-14 Tagen
  • Versandkostenfrei
  • Auch auf Rechnung
  • Artikel merken

Valuation of trust in open networks.- Security versus performance requirements in data communication systems.- Non-interference through determinism.- Compile-time detection of information flow in sequential programs.- Security through type analysis.- Designing secure key exchange protocols.- Robust and secure password and key change method.- Beacon based authentication.- Authentication via multi-service tickets in the Kuperee server.- Oblivious signatures.- A calculus for secure channel establishment in open networks.- On strengthening authentication protocols to foil cryptanalysis.- An efficient electronic payment system protecting privacy.- The ESPRIT project CAFE —High security digital payment systems.- Liability and computer security: Nine principles.- Implementing secure dependencies over a network by designing a distributed security subsystem.- A secure medium access control protocol: Security versus performances.- Distributed file system over a multilevel secure architecture problems and solutions.- On the expressive power of the unary transformation model.- Privilege graph: An extension to the typed access matrix model.- A consideration of the modes of operation for secure systems.- Mark-and-sweep garbage collection in multilevel secure object-oriented database systems.- Decomposition of multilevel objects in an object-oriented database.- Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture.- Aggregation in relational databases: Controlled disclosure of sensitive information.- Information flow controls vs inference controls: An integrated approach.

Erscheint lt. Verlag 1.7.2005
Reihe/Serie Computer Science
Computer Science (R0)
Lecture Notes in Computer Science
Zusatzinfo XIV, 474 p.
Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Theorie / Studium Kryptologie
Schlagworte Access Control • Communication • Computer Security • Computersicherheit • Database Security • Data Security • Datenbanksicherheit • Datensicherheit • Information • security • System Security • Systemsicherheit • Zugangskontrolle
ISBN-10 3-540-49034-5 / 3540490345
ISBN-13 978-3-540-49034-0 / 9783540490340
Zustand Neuware
Informationen gemäß Produktsicherheitsverordnung (GPSR)
Haben Sie eine Frage zum Produkt?