LEADER 05191nam 22008175 450 001 996466152903316 005 20200701065247.0 010 $a3-540-45299-0 024 7 $a10.1007/10722599 035 $a(CKB)1000000000548806 035 $a(SSID)ssj0000322134 035 $a(PQKBManifestationID)11247760 035 $a(PQKBTitleCode)TC0000322134 035 $a(PQKBWorkID)10283248 035 $a(PQKB)10828657 035 $a(DE-He213)978-3-540-45299-7 035 $a(MiAaPQ)EBC3088743 035 $a(PPN)155236601 035 $a(EXLCZ)991000000000548806 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 2000$b[electronic resource] $e6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings /$fedited by Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (X, 330 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1895 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-41031-7 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aPersonal Devices and Smart Cards -- Checking Secure Interactions of Smart Card Applets -- Verification of a Formal Security Model for Multiapplicative Smart Cards -- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications -- Electronic Commerce Protocols -- Secure Anonymous Signature-Based Transactions -- Metering Schemes for General Access Structures -- Access Control -- A Typed Access Control Model for CORBA -- Safety Analysis of the Dynamic-Typed Access Matrix Model -- A Formal Model for Role-Based Access Control Using Graph Transformation -- Protocol Verification -- A Formal Semantics for SPKI -- Formal Verification of Cardholder Registration in SET -- Automating Data Independence -- Internet Security -- Finding a Connection Chain for Tracing Intruders -- A Full Bandwidth ATM Firewall -- Security Property Analysis -- Analysing Time Dependent Security Properties in CSP Using PVS -- Unwinding Possibilistic Security Properties -- Authentication and Confidentiality via IPsec -- Mobile Agents -- A Security Framework for a Mobile Agent System -- A Distributed Access Control Model for Java -- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. 330 $ahis book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1895 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aData encryption (Computer science) 606 $aComputer logic 606 $aManagement information systems 606 $aComputer science 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aData encryption (Computer science). 615 0$aComputer logic. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aCryptology. 615 24$aLogics and Meanings of Programs. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aCuppens$b Frederic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeswarte$b Yves$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWaidner$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Symposium on Research in Computer Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466152903316 996 $aComputer Security - ESORICS 2000$92158504 997 $aUNISA LEADER 04446nam 22006975 450 001 9910298487903321 005 20251113181734.0 010 $a1-4899-7553-5 024 7 $a10.1007/978-1-4899-7553-9 035 $a(CKB)3710000000377817 035 $a(EBL)2096339 035 $a(SSID)ssj0001465441 035 $a(PQKBManifestationID)11833326 035 $a(PQKBTitleCode)TC0001465441 035 $a(PQKBWorkID)11477840 035 $a(PQKB)10154683 035 $a(DE-He213)978-1-4899-7553-9 035 $a(MiAaPQ)EBC2096339 035 $a(PPN)184895243 035 $a(MiAaPQ)EBC3108635 035 $a(EXLCZ)993710000000377817 100 $a20150318d2015 u| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aData Envelopment Analysis $eA Handbook of Models and Methods /$fedited by Joe Zhu 205 $a1st ed. 2015. 210 1$aNew York, NY :$cSpringer US :$cImprint: Springer,$d2015. 215 $a1 online resource (472 p.) 225 1 $aInternational Series in Operations Research & Management Science,$x2214-7934 ;$v221 300 $aDescription based upon print version of record. 311 08$a1-4899-7552-7 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aDistance Functions in Primal and Dual Spaces -- DEA Cross Efficiency -- DEA Cross Efficiency Under Variable Returns to Scale -- Discrete and Integer Valued Inputs and Outputs in Data Envelopnebt Analysis -- DEA Models with Production Trade-offs and Weight Restrictions -- Facet Analysis in Data Envelopment Analysis -- Stochastic Nonparametric Approach to Efficiency Analysis: A Unified Framework -- Translation Invariance in Data Envelopment Analysis -- Scale Elasticity in Non-parametric DEA Approach -- DEA Based Benchmarking Models -- Data Envelopment Analysis with Non-Homogeneous DMUs -- Efficiency Measurement in Data Envelopment Analysis with Fuzzy Data -- Partial Input to Output Impacts in DEA: Production Considerations and Resource Sharing Among Business Sub-Units -- Super-efficiency in Data Envelopment Analysis -- DEA Models with Undesirable Inputs -- Frontier Differences and the Global Malmquist Index. 330 $aThis handbook represents a milestone in the progression of Data Envelopment Analysis (DEA). Written by experts who are often major contributors to DEA theory, it includes a collection of chapters that represent the current state-of-the-art in DEA research. Topics include distance functions and their value duals, cross-efficiency measures in DEA, integer DEA, weight restrictions and production trade-offs, facet analysis in DEA, scale elasticity, benchmarking and context-dependent DEA, fuzzy DEA, non-homogenous units, partial input-output relations, super efficiency, treatment of undesirable measures, translation invariance, stochastic nonparametric envelopment of data, and global frontier index. Focusing only on new models/approaches of DEA, the book includes contributions from Juan Aparicio, Mette Asmild, Yao Chen, Wade D. Cook, Juan Du, Rolf Färe, Julie Harrison, Raha Imanirad, Andrew Johnson, Chiang Kao, Abolfazl Keshvari, Timo Kuosmanen, Sungmook Lim, Wenbin Liu, Dimitri Margaritis, Reza Kazemi Matin, Ole B. Olesen, Jesus T. Pastor, Niels Chr. Petersen, Victor V. Podinovski, Paul Rouse, Antti Saastamoinen, Biresh K. Sahoo, Kaoru Tone, and Zhongbao Zhou. 410 0$aInternational Series in Operations Research & Management Science,$x2214-7934 ;$v221 606 $aOperations research 606 $aManagement science 606 $aIndustrial engineering 606 $aProduction engineering 606 $aOperations Research and Decision Theory 606 $aOperations Research, Management Science 606 $aIndustrial and Production Engineering 615 0$aOperations research. 615 0$aManagement science. 615 0$aIndustrial engineering. 615 0$aProduction engineering. 615 14$aOperations Research and Decision Theory. 615 24$aOperations Research, Management Science. 615 24$aIndustrial and Production Engineering. 676 $a519.72 702 $aZhu$b Joe$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910298487903321 996 $aData envelopment analysis$9394439 997 $aUNINA