Computer Security - ESORICS 2000 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings

his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sec...

Full description

Bibliographic Details
Other Authors: Cuppens, Frederic (Editor), Deswarte, Yves (Editor), Gollmann, Dieter (Editor), Waidner, Michael (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2000, 2000
Edition:1st ed. 2000
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 03315nmm a2200421 u 4500
001 EB000656386
003 EBX01000000000000000509468
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783540452997 
100 1 |a Cuppens, Frederic  |e [editor] 
245 0 0 |a Computer Security - ESORICS 2000  |h Elektronische Ressource  |b 6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings  |c edited by Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner 
250 |a 1st ed. 2000 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2000, 2000 
300 |a X, 330 p  |b online resource 
505 0 |a Personal Devices and Smart Cards -- Checking Secure Interactions of Smart Card Applets -- Verification of a Formal Security Model for Multiapplicative Smart Cards -- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications -- Electronic Commerce Protocols -- Secure Anonymous Signature-Based Transactions -- Metering Schemes for General Access Structures -- Access Control -- A Typed Access Control Model for CORBA -- Safety Analysis of the Dynamic-Typed Access Matrix Model -- A Formal Model for Role-Based Access Control Using Graph Transformation -- Protocol Verification -- A Formal Semantics for SPKI -- Formal Verification of Cardholder Registration in SET -- Automating Data Independence -- Internet Security -- Finding a Connection Chain for Tracing Intruders -- A Full Bandwidth ATM Firewall -- Security Property Analysis -- Analysing Time Dependent Security Properties in CSP Using PVS -- Unwinding Possibilistic Security Properties -- Authentication and Confidentiality via IPsec -- Mobile Agents -- A Security Framework for a Mobile Agent System -- A Distributed Access Control Model for Java -- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code 
653 |a Computer Communication Networks 
653 |a Computer Science Logic and Foundations of Programming 
653 |a Operating Systems 
653 |a Computer science 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Computer networks  
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a IT Operations 
700 1 |a Deswarte, Yves  |e [editor] 
700 1 |a Gollmann, Dieter  |e [editor] 
700 1 |a Waidner, Michael  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/10722599 
856 4 0 |u https://doi.org/10.1007/10722599?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
520 |a his book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents