Computer Security - ESORICS 94
Springer Berlin (Hersteller)
978-3-540-49034-0 (ISBN)
Valuation of trust in open networks.- Security versus performance requirements in data communication systems.- Non-interference through determinism.- Compile-time detection of information flow in sequential programs.- Security through type analysis.- Designing secure key exchange protocols.- Robust and secure password and key change method.- Beacon based authentication.- Authentication via multi-service tickets in the Kuperee server.- Oblivious signatures.- A calculus for secure channel establishment in open networks.- On strengthening authentication protocols to foil cryptanalysis.- An efficient electronic payment system protecting privacy.- The ESPRIT project CAFE —High security digital payment systems.- Liability and computer security: Nine principles.- Implementing secure dependencies over a network by designing a distributed security subsystem.- A secure medium access control protocol: Security versus performances.- Distributed file system over a multilevel secure architecture problems and solutions.- On the expressive power of the unary transformation model.- Privilege graph: An extension to the typed access matrix model.- A consideration of the modes of operation for secure systems.- Mark-and-sweep garbage collection in multilevel secure object-oriented database systems.- Decomposition of multilevel objects in an object-oriented database.- Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture.- Aggregation in relational databases: Controlled disclosure of sensitive information.- Information flow controls vs inference controls: An integrated approach.
| Erscheint lt. Verlag | 1.7.2005 |
|---|---|
| Reihe/Serie | Computer Science |
| Computer Science (R0) | Lecture Notes in Computer Science |
| Zusatzinfo | XIV, 474 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Access Control • Communication • Computer Security • Computersicherheit • Database Security • Data Security • Datenbanksicherheit • Datensicherheit • Information • security • System Security • Systemsicherheit • Zugangskontrolle |
| ISBN-10 | 3-540-49034-5 / 3540490345 |
| ISBN-13 | 978-3-540-49034-0 / 9783540490340 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |