Recomienda este artículo a tus amigos:
Computer Security - Esorics 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings - Lecture Notes in Computer Science Yves Deswarte
Computer Security - Esorics 92: Second European Symposium on Research in Computer Security, Toulouse, France, November 23-25, 1992, Proceedings - Lecture Notes in Computer Science
Yves Deswarte
The aim of this symposium was to further the progress of research in computer security by promoting the exchange of ideas. This volume contains papers grouped into sections on access control, formal methods, authentication, distributed systems, database security, architectures and applications.
Marc Notes: Includes bibliographical references and index. Table of Contents: Access Control.- Towards security in an open systems federation.- Type-level access controls for distributed structurally object-oriented database systems.- On the Chinese Wall model.- Formal Methods.- Formal methods and automated tool for timing-channel identification in tcb source code.- Separating the specification and implementation phases in cryptology.- Formal specification of security requirements using the theory of normative positions.- Invited Talk.- Breaking the traditional computer security research barriers.- Authentication I.- Verification and modelling of authentication protocols.- KryptoKnight authentication and key distribution system.- Associating metrics to certification paths.- Distributed Systems.- An Object-Oriented view of fragmented data processing for fault and intrusion tolerance in distributed systems.- The development and testing of the identity-based conference key distribution system for the RHODOS distributed system.- Policy enforcement in stub autonomous domains.- Authentication II.- Freshness assurance of authentication protocols.- A formal framework for authentication.- Timely authentication in distributed systems.- Database Security.- Polyinstantiation for cover stories.- On transaction processing for multilevel secure replicated databases.- Security constraint processing in multilevel secure AMAC schemata.- System Architectures.- M2S: A machine for multilevel security.- GDoM a multilevel document manager.- Applications.- UEPS A second generation electronic wallet.- A hardware design model for cryptographic algorithms.- ASAX: Software architecture and rule-based language for universal audit trail analysis."Publisher Marketing: The aim of this symposium was to further the progress of research in computer security by promoting the exchange of ideas. This volume contains papers grouped into sections on access control, formal methods, authentication, distributed systems, database security, architectures and applications.
| Medios de comunicación | Libros Paperback Book (Libro con tapa blanda y lomo encolado) |
| Publicado | 10 de noviembre de 1992 |
| ISBN13 | 9783540562467 |
| Editores | Springer-Verlag Berlin and Heidelberg Gm |
| Páginas | 456 |
| Dimensiones | 216 × 279 × 24 mm · 653 g |
| Lengua | Alemán |
| Editor | Deswarte, Yves |
| Editor | Eizenberg, G. |
| Editor | Quisquater, J.j. |
Mas por Yves Deswarte
Mostrar todoMere med samme udgiver
Ver todo de Yves Deswarte ( Ej. Paperback Book y Hardcover Book )