+612 9045 4394
 
CHECKOUT
Security Protocols : 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings - Bruce Christianson

Security Protocols

6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings

Paperback

Published: 26th February 1999
Ships: 5 to 9 business days
5 to 9 business days
$116.16
or 4 easy payments of $29.04 with Learn more

Other Available Formats (Hide)

  • Paperback View Product Published: 12th September 2001
    Ships: 5 to 9 business days
    5 to 9 business days
    $125.05
  • Paperback View Product Published: 15th October 2009
    Ships: 5 to 9 business days
    5 to 9 business days
    $135.51
  • Paperback View Product Published: 30th November 2007
    Ships: 5 to 9 business days
    5 to 9 business days
    $147.02
  • Paperback View Product Published: 13th January 2004
    Ships: 5 to 9 business days
    5 to 9 business days
    $125.05
  • Paperback View Product Published: 13th September 2006
    Ships: 5 to 9 business days
    5 to 9 business days
    $125.05
  • Paperback View Product Published: 14th January 1998
    Ships: 5 to 9 business days
    5 to 9 business days
    $105.64
  • Paperback View Product Published: 23rd September 2002
    Ships: 5 to 9 business days
    5 to 9 business days
    $125.05
  • Paperback View Product Published: 4th January 2011
    $147.75

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998.
The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the implications and effects of these upon such issues as authorization, security policy, and cryptosystems and component design.

Inductive Analysis of the Internet Protocol TLSp. 1
Discussionp. 13
External Consistency and the Veri cation of Security Protocolsp. 24
Discussionp. 28
The Trust Shell Gamep. 36
Discussionp. 41
Overview of the AT&T Labs Trust-Management Projectp. 45
Discussionp. 51
KeyNote: Trust Management for Public-Key Infrastructuresp. 59
Discussion - Trust Managementp. 64
Application-Oriented Security Policies and Their Compositionp. 67
Discussionp. 75
Secure Fingerprinting Using Public-Key Cryptographyp. 83
Discussionp. 90
Third Party Certi cation of HTTP Service Access Statisticsp. 95
Discussionp. 100
Delegating Trustp. 108
Delegation of Responsibilityp. 118
Discussionp. 125
Abuse of Processp. 131
A New Concept in Protocols: Veri able Computational Delegationp. 137
Discussionp. 146
Delegation and Not-So Smart Cardsp. 154
Discussionp. 158
Certi cation and Delegationp. 168
Discussion - Di erences Between Academic and Commercial Securityp. 177
Optimistic Trust with Realistic eNvestigatorsp. 193
Discussionp. 203
Insider Fraudp. 213
Discussionp. 220
Panel Session - Future Directionsp. 227
Contributor Indexp. 241
Table of Contents provided by Publisher. All Rights Reserved.

ISBN: 9783540656630
ISBN-10: 3540656634
Series: Lecture Notes in Computer Science,
Audience: General
Format: Paperback
Language: English
Number Of Pages: 252
Published: 26th February 1999
Publisher: SPRINGER VERLAG GMBH
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 1.4
Weight (kg): 0.37