E-Book, Englisch, Band 1550, 252 Seiten, eBook
Christianson / Crispo / Harbison Security Protocols
Erscheinungsjahr 2003
ISBN: 978-3-540-49135-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings
E-Book, Englisch, Band 1550, 252 Seiten, eBook
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-49135-4
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Inductive Analysis of the Internet Protocol TLS.- Inductive Analysis of the Internet Protocol TLS.- External Consistency and the Verification of Security Protocols.- External Consistency and the Verification of Security Protocols.- The Trust Shell Game.- The Trust Shell Game.- Overview of the AT&T Labs Trust-Management Project.- Overview of the AT&T Labs Trust-Management Project.- KeyNote: Trust Management for Public-Key Infrastructures.- Discussion Session — Trust Management.- Application-Oriented Security Policies and Their Composition.- Application-Oriented Security Policies and Their Composition.- Secure Fingerprinting Using Public-Key Cryptography.- Secure Fingerprinting Using Public-Key Cryptography.- Third Party Certification of HTTP Service Access Statistics.- Third Party Certification of HTTP Service Access Statistics.- Delegating Trust.- Delegation of Responsibilities.- Delegation of Responsibility.- Abuse of Process.- A New Concept in Protocols: Verifiable Computational Delegation.- A New Concept in Protocols: Verifiable Computational Delegation.- Delegation and Not-So Smart Cards.- Delegation and Not-So Smart Cards.- Certification and Delegation.- Discussion Session: Differences Between Academic and Commercial Security.- Optimistic Trust with Realistic eNvestigators.- Optimistic Trust with Realistic Investigators.- Insider Fraud.- Insider Fraud.- Panel Session - Future Directions.