+612 9045 4394
 
CHECKOUT
Security Protocols : 10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers - Bruce Christianson

Security Protocols

10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers

By: Bruce Christianson (Editor), Bruno Crispo (Editor), James A. Malcolm (Editor), Michael Roe (Editor)

Paperback

Published: 13th January 2004
Ships: 5 to 9 business days
5 to 9 business days
$125.05
or 4 easy payments of $31.26 with Learn more

Other Available Formats (Hide)

  • Paperback View Product Published: 26th February 1999
    Ships: 5 to 9 business days
    5 to 9 business days
    $116.16
  • Paperback View Product Published: 4th January 2011
    $149.50
  • Paperback View Product Published: 12th September 2001
    Ships: 5 to 9 business days
    5 to 9 business days
    $125.05
  • Paperback View Product Published: 13th September 2006
    Ships: 5 to 9 business days
    5 to 9 business days
    $125.05
  • Paperback View Product Published: 13th November 2013
    Ships: 5 to 9 business days
    5 to 9 business days
    $105.64
  • Paperback View Product Published: 30th November 2007
    Ships: 5 to 9 business days
    5 to 9 business days
    $147.02

Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was "Discerning the Protocol Participants." Security protocols are usually described in terms of the active participants - Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity, authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know.

Introductionp. 1
Keynote Addressp. 2
Weak Authentication: How to Authenticate Unknown Principals without Trusted Partiesp. 5
Is Entity Authentication Necessary?p. 20
A Structured Operational Modelling of the Dolev-Yao Threat Modelp. 34
On Trust Establishment in Mobile Ad-Hoc Networksp. 47
Legally Authorized and Unauthorized Digital Evidencep. 67
Shrink-Wrapped Optimism: The DODA Approach to Distributed Document Processingp. 74
Contractual Access Controlp. 96
Confidentiality Levels and Deliberate/Indeliberate Protocol Attacksp. 104
Analyzing Delegation Propertiesp. 120
Combinatorial Optimization of Countermeasures against Illegal Copyingp. 128
Protocols with Certified-Transfer Serversp. 145
An Architecture for an Adaptive Intrusion-Tolerant Serverp. 158
Supporting Imprecise Delegation in KeyNotep. 179
Modelling Protocols for Secure Group Communications in Ad Hoc Networksp. 189
Delegation of Signalling Rightsp. 203
Mobile IPv6 Securityp. 215
Back to the Beginningp. 242
Author Indexp. 243
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540208303
ISBN-10: 3540208305
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 248
Published: 13th January 2004
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.5 x 15.5  x 1.37
Weight (kg): 0.8