Computer security - ESORICS 2000: 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London
Springer
2000
|
Schriftenreihe: | Lecture notes in computer science
1895 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | X, 323 S. |
ISBN: | 3540410317 |
Internformat
MARC
LEADER | 00000nam a22000008cb4500 | ||
---|---|---|---|
001 | BV013315745 | ||
003 | DE-604 | ||
005 | 20001017 | ||
007 | t| | ||
008 | 000822s2000 gw |||| 10||| eng d | ||
016 | 7 | |a 959576185 |2 DE-101 | |
020 | |a 3540410317 |9 3-540-41031-7 | ||
035 | |a (OCoLC)472163930 | ||
035 | |a (DE-599)BVBBV013315745 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-384 |a DE-739 |a DE-473 |a DE-706 |a DE-83 |a DE-188 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a DAT 460f |2 stub | ||
084 | |a DAT 040f |2 stub | ||
111 | 2 | |a ESORICS |n 6 |d 2000 |c Toulouse |j Verfasser |0 (DE-588)10007169-7 |4 aut | |
245 | 1 | 0 | |a Computer security - ESORICS 2000 |b 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings |c Frédéric Cuppens ... (ed.) |
264 | 1 | |a Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London |b Springer |c 2000 | |
300 | |a X, 323 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 1895 | |
650 | 4 | |a Computer security | |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2000 |z Toulouse |2 gnd-content | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 1 | 1 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Cuppens, Frédéric |e Sonstige |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 1895 |w (DE-604)BV000000607 |9 1895 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009079819&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-009079819 |
Datensatz im Suchindex
_version_ | 1820874894776205312 |
---|---|
adam_text |
TABLE
OF
CONTENTS
PERSONAL
DEVICES
AND
SMART
CARDS
CHECKING
SECURE
INTERACTIONS
OF
SMART
CARD
APPLETS
.
1
P.
BIEBER,
J.
CAZIN,
P.
GIRARD,
J.-L.
LANET,
V.
WIELS,
AND
G.
ZANON
VERIFICATION
OF
A
FORMAL
SECURITY
MODEL
FOR
MULTIAPPLICATIVE
SMART
CARDS
17
GERHARD
SCHELLHOM,
WOLFGANG
REIF,
AXEL
SCHAIRER,
PAUL
KARGER,
VERNON
AUSTEL,
AND
DAVID
TOLL
HOW
MUCH
NEGOTIATION
AND
DETAIL
CAN
USERS
HANDLE?
EXPERIENCES
WITH
SECURITY
NEGOTIATION
AND
THE
GRANULARITY
OF
ACCESS
CONTROL
IN
COMMUNICATIONS
.
37
KAI
RANNENBERG
ELECTRONIC
COMMERCE
PROTOCOLS
SECURE
ANONYMOUS
SIGNATURE-BASED
TRANSACTIONS
.
55
ELS
VAN
HERREWEGHEN
METERING
SCHEMES
FOR
GENERAL
ACCESS
STRUCTURES
.
72
BARBARA
MASUCCI
AND
DOUGLAS
R.
STINSON
ACCESS
CONTROL
A
TYPED
ACCESS
CONTROL
MODEL
FOR
CORBA
.
88
GERALD
BROSE
SAFETY
ANALYSIS
OF
THE
DYNAMIC-TYPED
ACCESS
MATRIX
MODEL
.
106
MASAKAZU
SOSHI
A
FORMAL
MODEL
FOR
ROLE-BASED
ACCESS
CONTROL
USING
GRAPH
TRANSFORMATION
.
122
MANUEL
KOCH,
LUIGI
V.
MANCINI,
AND
FRANCESCO
PARISI-PRESICCE
PROTOCOL
VERIFICATION
A
FORMAL
SEMANTICS
FOR
SPKI
.
140
JON
HOWELL
AND
DAVID
KOTZ
FORMAL
VERIFICATION
OF
CARDHOLDER
REGISTRATION
IN
SET
.
159
GIAMPAOLO
BELLA,
FABIO
MASSACCI,
LAWRENCE
C.
PAULSON,
AND
PIERO
TRAMONTANE
X
TABLE
OF
CONTENTS
AUTOMATING
DATA
INDEPENDENCE
.
175
P.
J.
BROADFOOT,
G.
LOWE,
AND
A.
W.
ROSCOE
INTERNET
SECURITY
FINDING
A
CONNECTION
CHAIN
FOR
TRACING
INTRUDERS
.
191
KUNIKAZU
YODA
AND
HIROAKI
ETOH
A
FULL
BANDWIDTH
ATM
FIREWALL
.
206
OLIVIER
PAUL,
MARYLINE
LAURENT,
AND
SYLVIAN
GOMBAULT
SECURITY
PROPERTY
ANALYSIS
ANALYSING
TIME
DEPENDENT
SECURITY
PROPERTIES
IN
CSP
USING
PVS
.
222
NEIL
EVANS
AND
STEVE
SCHNEIDER
UNWINDING
POSSIBILISTIC
SECURITY
PROPERTIES
.
238
HEIKO
MANTEL
AUTHENTICATION
AND
CONFIDENTIALITY
VIA
IP
SEC
.
255
JOSHUA
D.
GUTTMAN,
AMY
L.
HERZOG,
AND
F.
JAVIER
THAYER
MOBILE
AGENTS
A
SECURITY
FRAMEWORK
FOR
A
MOBILE
AGENT
SYSTEM
.
273
CIARAN
BRYCE
A
DISTRIBUTED
ACCESS
CONTROL
MODEL
FOR
JAVA
.
291
REFIK
MOLVA
AND
YVES
ROUDIER
USING
REFLECTION
AS
A
MECHANISM
FOR
ENFORCING
SECURITY
POLICIES
IN
MOBILE
CODE
.
309
IAN
WELCH
AND
ROBERT
J.
STROUD
AUTHOR
INDEX
.
325 |
any_adam_object | 1 |
author_corporate | ESORICS Toulouse |
author_corporate_role | aut |
author_facet | ESORICS Toulouse |
author_sort | ESORICS Toulouse |
building | Verbundindex |
bvnumber | BV013315745 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 460f DAT 040f |
ctrlnum | (OCoLC)472163930 (DE-599)BVBBV013315745 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a22000008cb4500</leader><controlfield tag="001">BV013315745</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20001017</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">000822s2000 gw |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">959576185</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540410317</subfield><subfield code="9">3-540-41031-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)472163930</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013315745</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 460f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 040f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ESORICS</subfield><subfield code="n">6</subfield><subfield code="d">2000</subfield><subfield code="c">Toulouse</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)10007169-7</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer security - ESORICS 2000</subfield><subfield code="b">6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings</subfield><subfield code="c">Frédéric Cuppens ... (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London</subfield><subfield code="b">Springer</subfield><subfield code="c">2000</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">X, 323 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1895</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2000</subfield><subfield code="z">Toulouse</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Cuppens, Frédéric</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1895</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1895</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009079819&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009079819</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2000 Toulouse gnd-content |
genre_facet | Konferenzschrift 2000 Toulouse |
id | DE-604.BV013315745 |
illustrated | Not Illustrated |
indexdate | 2025-01-10T15:07:00Z |
institution | BVB |
institution_GND | (DE-588)10007169-7 |
isbn | 3540410317 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009079819 |
oclc_num | 472163930 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-384 DE-739 DE-473 DE-BY-UBG DE-706 DE-83 DE-188 |
owner_facet | DE-91G DE-BY-TUM DE-384 DE-739 DE-473 DE-BY-UBG DE-706 DE-83 DE-188 |
physical | X, 323 S. |
publishDate | 2000 |
publishDateSearch | 2000 |
publishDateSort | 2000 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ESORICS 6 2000 Toulouse Verfasser (DE-588)10007169-7 aut Computer security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings Frédéric Cuppens ... (ed.) Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London Springer 2000 X, 323 S. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 1895 Computer security Datensicherung (DE-588)4011144-1 gnd rswk-swf Internet (DE-588)4308416-3 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2000 Toulouse gnd-content Computersicherheit (DE-588)4274324-2 s DE-604 Internet (DE-588)4308416-3 s Datensicherung (DE-588)4011144-1 s Cuppens, Frédéric Sonstige oth Lecture notes in computer science 1895 (DE-604)BV000000607 1895 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009079819&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Computer security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings Lecture notes in computer science Computer security Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4011144-1 (DE-588)4308416-3 (DE-588)4274324-2 (DE-588)1071861417 |
title | Computer security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings |
title_auth | Computer security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings |
title_exact_search | Computer security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings |
title_full | Computer security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings Frédéric Cuppens ... (ed.) |
title_fullStr | Computer security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings Frédéric Cuppens ... (ed.) |
title_full_unstemmed | Computer security - ESORICS 2000 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings Frédéric Cuppens ... (ed.) |
title_short | Computer security - ESORICS 2000 |
title_sort | computer security esorics 2000 6th european symposium on research in computer security toulouse france october 4 6 2000 proceedings |
title_sub | 6th European Symposium on Research in Computer Security, Toulouse, France, October 4 - 6, 2000 ; proceedings |
topic | Computer security Datensicherung (DE-588)4011144-1 gnd Internet (DE-588)4308416-3 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Computer security Datensicherung Internet Computersicherheit Konferenzschrift 2000 Toulouse |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009079819&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT esoricstoulouse computersecurityesorics20006theuropeansymposiumonresearchincomputersecuritytoulousefranceoctober462000proceedings AT cuppensfrederic computersecurityesorics20006theuropeansymposiumonresearchincomputersecuritytoulousefranceoctober462000proceedings |