Skip to main content
  • Conference proceedings
  • © 1996

Computer Security - ESORICS 96

4th European Symposium on Research in Computer Security, Rome, Italy, September 25 - 27, 1996, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1146)

Conference series link(s): ESORICS: European Symposium on Research in Computer Security

Conference proceedings info: ESORICS 1996.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (23 papers)

  1. Front Matter

  2. Digital payment systems with passive anonymity-revoking trustees

    • Jan Camenisch, Ueli Maurer, Markus Stadler
    Pages 33-43
  3. An authorization model for workflows

    • Vijayalakshmi Atluri, Wei-Kuang Huang
    Pages 44-64
  4. A multilevel security model for distributed object systems

    • Vincent Nicomette, Yves Deswarte
    Pages 80-98
  5. An authorization model for federated systems

    • Sabrina De Capitani di Vimercati, Pierangela Samarati
    Pages 99-117
  6. Security for mobile agents: Authentication and state appraisal

    • William M. Farmer, Joshua D. Guttman, Vipin Swarup
    Pages 118-130
  7. Server-Supported Signatures

    • N. Asokan, G. Tsudik, M. Waidner
    Pages 131-143
  8. Limitations of the approach of solving a network's security problems with a firewall

    • Stefano Zatti, Refik Molva, Angelo Tosi, Gene Tsudik, Helmut Kurth
    Pages 144-145
  9. Certified electronic mail

    • Jianying Zhou, Dieter Gollmann
    Pages 160-171
  10. Distributed proctoring

    • Bruce Schneier, John Kelsey, Jay Walker
    Pages 172-182
  11. Merging heterogeneous security orderings

    • P. A. Bonatti, M. L. Sapino, V. S. Subrahmanian
    Pages 183-197
  12. CSP and anonymity

    • Steve Schneider, Abraham Sidiropoulos
    Pages 198-218
  13. Formal semantics for authentication logics

    • Gabriele Wedel, Volker Kessler
    Pages 219-241
  14. The impact of multilevel security on database buffer management

    • Andrew Warner, Qiang Li, Thomas Keefe, Shankar Pal
    Pages 266-289
  15. Enhancing the controlled disclosure of sensitive information

    • Donald G. Marks, Amihai Motro, Sushil Jajodia
    Pages 290-303

Other Volumes

  1. Computer Security — ESORICS 96

About this book

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96.
The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access