My Account Log in

1 option

Security Protocols : 7th International Workshop Cambridge, UK, April 19-21, 1999 Proceedings / edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Christianson, Bruce, editor.
Crispo, Bruno, editor.
Malcolm, James (Computer scientist), editor.
Roe, Michael (Computer scientist), editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 1796.
Lecture Notes in Computer Science, 0302-9743 ; 1796
Language:
English
Subjects (All):
Computer networks.
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer science.
Computer Communication Networks.
Cryptology.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Local Subjects:
Computer Communication Networks.
Cryptology.
Algorithm Analysis and Problem Complexity.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XII, 232 pages).
Edition:
First edition 2000.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2000.
System Details:
text file PDF
Summary:
Another year, another workshop. Here are the proceedings of the seventh Cambridge International Workshop on Security Protocols. All very well, you may think, but can there really still be anything genuinely new to say? Is it not just the same old things a tiny bit better? Well, perhaps surprisingly, this year we discoveredsome radically new things beginning to happen. The reasons in retrospect are not far to seek: advances in technology, changes in the system context, and new types of consumer devices and applications have combined to expose new security requirements. This has led not only to new protocols and models, but also to known protocols being deployedindelicate newways,withpreviousfragilitiesofwatermarkingand- tual authentication, for example, becoming desirable features. At the workshop we identi?ed several of these developments and began to map out some lines of enquiry. This volume brings you a selection of deliberately disputatious position - pers, followed by not-quite-verbatim transcripts of the discussions which they provoked. As always, our purpose in making these proceedings available to you is the hope that they will move your thinking in an unexpected direction. If you ?nd your attention caught by something here, if it makes you pause to re?ect, or to think "why, that is justso wrong",then good. We're waiting for your mail.
Contents:
Keynote Address: The Changing Environment
Composing Security Properties
Auditing against Multiple Policies
Jikzi: A New Framework for Secure Publishing
Power and Permission in Security Systems
Power and Permission in Computer Systems
Auditing against Impossible Abstractions
What is Authentication?
Relations Between Secrets: The Yahalom Protocol
The Yahalom Protocol
Modelling Agents' Knowledge Inductively
Time-Lock Puzzle with Examinable Evidence of Unlocking Time
Trust Management and Network Layer Security Protocols
Issues in Multicast Security
Performance of Protocols
Integrity-Aware PCBC Encryption Schemes
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
The Resurrecting Duckling
INTERNET-MARKs: Clear, Secure, and Portable Visual Marks for the Cyber Worlds
INTERNET-MARKs
Pictures Can't Lie under Oath
Bob versus Bob - Good Guy/Bad Guy.
Other Format:
Printed edition:
ISBN:
978-3-540-45570-7
9783540455707
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account