This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.
The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Valuation of trust in open networks.- Security versus performance requirements in data communication systems.- Non-interference through determinism.- Compile-time detection of information flow in sequential programs.- Security through type analysis.- Designing secure key exchange protocols.- Robust and secure password and key change method.- Beacon based authentication.- Authentication via multi-service tickets in the Kuperee server.- Oblivious signatures.- A calculus for secure channel establishment in open networks.- On strengthening authentication protocols to foil cryptanalysis.- An efficient electronic payment system protecting privacy.- The ESPRIT project CAFE —High security digital payment systems.- Liability and computer security: Nine principles.- Implementing secure dependencies over a network by designing a distributed security subsystem.- A secure medium access control protocol: Security versus performances.- Distributed file system over a multilevel secure architecture problems and solutions.- On the expressive power of the unary transformation model.- Privilege graph: An extension to the typed access matrix model.- A consideration of the modes of operation for secure systems.- Mark-and-sweep garbage collection in multilevel secure object-oriented database systems.- Decomposition of multilevel objects in an object-oriented database.- Supporting object-based high-assurance write-up in multilevel databases for the replicated architecture.- Aggregation in relational databases: Controlled disclosure of sensitive information.- Information flow controls vs inference controls: An integrated approach.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
Da: GuthrieBooks, Spring Branch, TX, U.S.A.
Paperback. Condizione: Very Good. Ex-library paperback in very nice condition with the usual markings and attachments. Except for library markings, interior clean and unmarked. Tight binding. Codice articolo UTD14a-1831
Quantità: 1 disponibili
Da: Lucky's Textbooks, Dallas, TX, U.S.A.
Condizione: New. Codice articolo ABLIING23Mar3113020171541
Quantità: Più di 20 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783540586180_new
Quantità: Più di 20 disponibili
Da: Chiron Media, Wallingford, Regno Unito
Paperback. Condizione: New. Codice articolo 6666-IUK-9783540586180
Quantità: 10 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 488. Codice articolo 263073092
Quantità: 1 disponibili
Da: Majestic Books, Hounslow, Regno Unito
Condizione: New. pp. 488 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam. Codice articolo 5856155
Quantità: 1 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submission. Codice articolo 4894782
Quantità: Più di 20 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. pp. 488. Codice articolo 183073102
Quantità: 1 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - Print on Demand Titel. Neuware -This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 488 pp. Englisch. Codice articolo 9783540586180
Quantità: 1 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This volume constitutes the proceedings of the Third European Symposium on Research in Computer Security, held in Brighton, UK in November 1994.The 26 papers presented in the book in revised versions were carefully selected from a total of 79 submissions; they cover many current aspects of computer security research and advanced applications. The papers are grouped in sections on high security assurance software, key management, authentication, digital payment, distributed systems, access control, databases, and measures. Codice articolo 9783540586180
Quantità: 1 disponibili