Deswarte / Eizenberg / Quisquater | Computer Security - ESORICS 92 | E-Book | sack.de
E-Book

E-Book, Englisch, Band 648, 456 Seiten, eBook

Reihe: Lecture Notes in Computer Science

Deswarte / Eizenberg / Quisquater Computer Security - ESORICS 92

Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992. Proceedings
Erscheinungsjahr 2006
ISBN: 978-3-540-47488-3
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark

Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992. Proceedings

E-Book, Englisch, Band 648, 456 Seiten, eBook

Reihe: Lecture Notes in Computer Science

ISBN: 978-3-540-47488-3
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark



This volume presents the proceedings of the second European Symposium on Research in Computer Security (ESORICS 92), held in Toulouse in November 1992. The aim of this symposium is to further the progress of research in computer security by bringing together researchers in this area, by promoting the exchange of ideas with system developers, and by encouraging links with researchers in areas related to computer science, informationtheory, and artificial intelligence. The volume contains 24 papers organizedinto sections on access control, formal methods, authentication, distributed systems, database security, system architectures, and applications. ESORICS 92 was organized by AFCET (Association francaise des sciences et technologies de l'information et des syst mes) in cooperation with a large number of national and international societies and institutes.

Deswarte / Eizenberg / Quisquater Computer Security - ESORICS 92 jetzt bestellen!

Zielgruppe


Research

Weitere Infos & Material


Access Control.- Towards security in an open systems federation.- Type-level access controls for distributed structurally object-oriented database systems.- On the Chinese Wall model.- Formal Methods.- Formal methods and automated tool for timing-channel identification in tcb source code.- Separating the specification and implementation phases in cryptology.- Formal specification of security requirements using the theory of normative positions.- Invited Talk.- Breaking the traditional computer security research barriers.- Authentication I.- Verification and modelling of authentication protocols.- KryptoKnight authentication and key distribution system.- Associating metrics to certification paths.- Distributed Systems.- An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributed systems.- The development and testing of the identity-based conference key distribution system for the RHODOS distributed system.- Policy enforcement in stub autonomousdomains.- Authentication II.- Freshness assurance of authentication protocols.- A formal framework for authentication.- Timely authentication in distributed systems.- Database Security.- Polyinstantiation for cover stories.- On transaction processing for multilevel secure replicated databases.- Security constraint processing in multilevel secure AMAC schemata.- System Architectures.- M2S: A machine for multilevel security.- GDoM a multilevel document manager.- Applications.- UEPS — A second generation electronic wallet.- A hardware design model for cryptographic algorithms.- ASAX: Software architecture and rule-based language for universal audit trail analysis.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.