Skip to main content
  • Conference proceedings
  • © 1999

Security Protocols

6th International Workshop, Cambridge, UK, April 15-17, 1998, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1550)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 1998.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (31 papers)

  1. Front Matter

    Pages I-VII
  2. Inductive Analysis of the Internet Protocol TLS

    • Lawrence C. Paulson
    Pages 1-12
  3. The Trust Shell Game

    • Carl Ellison
    Pages 36-40
  4. The Trust Shell Game

    • Carl Ellison
    Pages 41-44
  5. KeyNote: Trust Management for Public-Key Infrastructures

    • Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis
    Pages 59-63
  6. Application-Oriented Security Policies and Their Composition

    • Virgil D. Gligor, Serban I. Gavrila
    Pages 67-74
  7. Secure Fingerprinting Using Public-Key Cryptography

    • Hiroshi Yoshiura, Ryoichi Sasaki, Kazuo Takaragi
    Pages 83-89
  8. Third Party Certification of HTTP Service Access Statistics

    • F. Bergadano, P. De Mauro
    Pages 95-99
  9. Delegating Trust

    • Bill Harbison
    Pages 108-117
  10. Delegation of Responsibilities

    • B. Crispo
    Pages 118-124
  11. Delegation of Responsibility

    • Bruno Crispo
    Pages 125-130

Other Volumes

  1. Security Protocols

About this book

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998.
The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the implications and effects of these upon such issues as authorization, security policy, and cryptosystems and component design.

Editors and Affiliations

  • Computer Science Department, University of Hertfordshire, Hatfield, UK

    Bruce Christianson

  • Computer Laboratory, University of Cambridge, Cambridge, UK

    Bruno Crispo

  • Department of Computer Science, University of Turin, Turin, Italy

    Bruno Crispo

  • Harlow Laboratories, Nortel Networks, Harlow, UK

    William S. Harbison

  • Centre for Communications Systems Research, University of Cambridge, Cambridge, UK

    Michael Roe

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access