LEADER 05191nam 22008175 450 001 996466152903316 005 20200701065247.0 010 $a3-540-45299-0 024 7 $a10.1007/10722599 035 $a(CKB)1000000000548806 035 $a(SSID)ssj0000322134 035 $a(PQKBManifestationID)11247760 035 $a(PQKBTitleCode)TC0000322134 035 $a(PQKBWorkID)10283248 035 $a(PQKB)10828657 035 $a(DE-He213)978-3-540-45299-7 035 $a(MiAaPQ)EBC3088743 035 $a(PPN)155236601 035 $a(EXLCZ)991000000000548806 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aComputer Security - ESORICS 2000$b[electronic resource] $e6th European Symposium on Research in Computer Security Toulouse, France, October 4-6, 2000 Proceedings /$fedited by Frederic Cuppens, Yves Deswarte, Dieter Gollmann, Michael Waidner 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (X, 330 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1895 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-41031-7 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $aPersonal Devices and Smart Cards -- Checking Secure Interactions of Smart Card Applets -- Verification of a Formal Security Model for Multiapplicative Smart Cards -- How Much Negotiation and Detail Can Users Handle? Experiences with Security Negotiation and the Granularity of Access Control in Communications -- Electronic Commerce Protocols -- Secure Anonymous Signature-Based Transactions -- Metering Schemes for General Access Structures -- Access Control -- A Typed Access Control Model for CORBA -- Safety Analysis of the Dynamic-Typed Access Matrix Model -- A Formal Model for Role-Based Access Control Using Graph Transformation -- Protocol Verification -- A Formal Semantics for SPKI -- Formal Verification of Cardholder Registration in SET -- Automating Data Independence -- Internet Security -- Finding a Connection Chain for Tracing Intruders -- A Full Bandwidth ATM Firewall -- Security Property Analysis -- Analysing Time Dependent Security Properties in CSP Using PVS -- Unwinding Possibilistic Security Properties -- Authentication and Confidentiality via IPsec -- Mobile Agents -- A Security Framework for a Mobile Agent System -- A Distributed Access Control Model for Java -- Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code. 330 $ahis book presents the refereed proceedings of the 6th European Symposium on Research in Computer Security, ESORICS 2000, held in Toulouse, France in October 2000. The 19 revised full papers presented were carefully reviewed and selected from a total of 75 submissions. The papers are organized in sections on personal devices and smart cards, electronic commerce protocols, access control, protocol verification, Internet security, security property analysis, and mobile agents. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1895 606 $aComputer communication systems 606 $aOperating systems (Computers) 606 $aData encryption (Computer science) 606 $aComputer logic 606 $aManagement information systems 606 $aComputer science 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aComputer communication systems. 615 0$aOperating systems (Computers). 615 0$aData encryption (Computer science). 615 0$aComputer logic. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aCryptology. 615 24$aLogics and Meanings of Programs. 615 24$aManagement of Computing and Information Systems. 676 $a005.8 702 $aCuppens$b Frederic$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aDeswarte$b Yves$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGollmann$b Dieter$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWaidner$b Michael$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aEuropean Symposium on Research in Computer Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466152903316 996 $aComputer Security - ESORICS 2000$92158504 997 $aUNISA LEADER 01009nam a22002417i 4500 001 991000678619707536 008 041206s2002 it 000 0 ita d 020 $a8813241704 035 $ab13256725-39ule_inst 040 $aDip.to Studi Giuridici$bita 082 0 $a344.45 100 1 $aRota, Alessandro$081260 245 13$aLa tutela dei beni culturali tra tecnica e discrezionalità /$cAlessandro Rota 260 $aPadova :$bCEDAM,$c2002 300 $axiv, 487 p. ;$c22 cm 650 4$aPatrimonio culturale$zItalia$xTutela 907 $a.b13256725$b02-04-14$c06-12-04 912 $a991000678619707536 945 $aLE016 344.45 ROT 01.01$g1$i2016000085105$lle016$on$pE28.50$q-$rn$so $t0$u0$v0$w0$x0$y.i14737991$z29-04-08 945 $aLE027 344.45 ROT01.01$g1$i2027000073238$lle027$o-$pE20.00$q-$rl$s- $t0$u4$v1$w4$x0$y.i13956577$z06-12-04 996 $aTutela dei beni culturali tra tecnica e discrezionalità$9984048 997 $aUNISALENTO 998 $a(2)le016$ale027$b06-12-04$cm$da $e-$fita$git $h3$i3 LEADER 01006nam a22002531i 4500 001 991000068069707536 005 20020909123707.0 008 020909s1992 gr |||||||||||||||||gre 020 $a9602691131 035 $ab11954553-39ule_inst 035 $aARCHE-004436$9ExL 040 $aDip.to Filologia Ling. e Lett.$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 100 1 $aChortatses, Georgios$0454405 245 13$aHe eleutheromene Hierousalem :$b(ta intermedia tes Erophiles) /$cGeorgiou Chortatse ; epimeleia Stylianos Alexiou, Martha Aposkite 260 $aAthena :$bStigme,$c1992 300 $a141 p. ;$c20 cm 700 1 $aAlexiou, Stylianos 700 1 $aAposkite, Martha 907 $a.b11954553$b02-04-14$c01-04-03 912 $a991000068069707536 945 $aLE008 FL.M. Neogr. 550$g1$iLE008N-9291$lle008$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i12230947$z01-04-03 996 $aEleutheromene Hierousalem$9916305 997 $aUNISALENTO 998 $ale008$b01-04-03$cm$da $e-$fgre$ggr $h3$i1