LEADER 05191nam 22008175 450 001 996466152903316 005 20200701065247.0 010 $a3-540-45299-0 024 7 $a10.1007/10722599 035 $a(CKB)1000000000548806 035 $a(SSID)ssj0000322134 035 $a(PQKBManifestationID)11247760 035 $a(PQKBTitleCode)TC0000322134 035 $a(PQKBWorkID)10283248 035 $a(PQKB)10828657 035 $a(DE-He213)978-3-540-45299-7 035 $a(MiAaPQ)EBC3088743 035 $a(PPN)155236601 035 $a(EXLCZ)991000000000548806 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 2000$b[electronic resource] $e6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings /$fedited by Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (X, 330 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1895 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-41031-7 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aPersonal Devices and Smart Cards -- Checking Secure Interactions of Smart Card Applets -- Verification of a Formal Security Model for Multiapplicative Smart Cards -- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications -- Electronic Commerce Protocols -- Secure Anonymous Signature-Based Transactions -- Metering Schemes for General Access Structures -- Access Control -- A Typed Access Control Model for CORBA -- Safety Analysis of the Dynamic-Typed Access Matrix Model -- A Formal Model for Role-Based Access Control Using Graph Transformation -- Protocol Verification -- A Formal Semantics for SPKI -- Formal Verification of Cardholder Registration in SET -- Automating Data Independence -- Internet Security -- Finding a Connection Chain for Tracing Intruders -- A Full Bandwidth ATM Firewall -- Security Property Analysis -- Analysing Time Dependent Security Properties in CSP Using PVS -- Unwinding Possibilistic Security Properties -- Authentication and Confidentiality via IPsec -- Mobile Agents -- A Security Framework for a Mobile Agent System -- A Distributed Access Control Model for Java -- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. 330 $ahis book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1895 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aData encryption (Computer science) 606 $aComputer logic 606 $aManagement information systems 606 $aComputer science 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aData encryption (Computer science). 615 0$aComputer logic. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aCryptology. 615 24$aLogics and Meanings of Programs. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aCuppens$b Frederic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeswarte$b Yves$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWaidner$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Symposium on Research in Computer Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466152903316 996 $aComputer Security - ESORICS 2000$92158504 997 $aUNISA