Skip to main content
  • Conference proceedings
  • © 2004

Security Protocols

10th International Workshop, Cambridge, UK, April 17-19, 2002, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2845)

Conference series link(s): Security Protocols: Cambridge International Workshop on Security Protocols

Conference proceedings info: Security Protocols 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (20 papers)

  1. Front Matter

  2. Introduction (Transcript)

    • Bruce Christianson
    Pages 1-1
  3. Keynote Address

    • Roger Needham
    Pages 2-4
  4. Is Entity Authentication Necessary?

    • Chris J. Mitchell, Paulo S. Pagliusi
    Pages 20-33
  5. On Trust Establishment in Mobile Ad-Hoc Networks

    • Laurent Eschenauer, Virgil D. Gligor, John Baras
    Pages 47-66
  6. Legally Authorized and Unauthorized Digital Evidence

    • Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki
    Pages 67-73
  7. Contractual Access Control

    • Babak Sadighi Firozabadi, Marek Sergot
    Pages 96-103
  8. Confidentiality Levels and Deliberate/Indeliberate Protocol Attacks

    • Giampaolo Bella, Stefano Bistarelli
    Pages 104-119
  9. Analyzing Delegation Properties

    • Giampaolo Bella, Lawrence C. Paulson
    Pages 120-127
  10. Combinatorial Optimization of Countermeasures against Illegal Copying

    • Ryoichi Sasaki, Hiroshi Yoshiura, Shinji Itoh
    Pages 128-144
  11. Protocols with Certified-Transfer Servers

    • Raphael Yahalom
    Pages 145-157
  12. An Architecture for an Adaptive Intrusion-Tolerant Server

    • Alfonso Valdes, Magnus Almgren, Steven Cheung, Yves Deswarte, Bruno Dutertre, Joshua Levy et al.
    Pages 158-178
  13. Supporting Imprecise Delegation in KeyNote

    • Simon N. Foley
    Pages 179-188
  14. Modeling Protocols for Secure Group Communications in Ad Hoc Networks

    • Alec Yasinsac, James A. Davis
    Pages 189-202
  15. Delegation of Signalling Rights

    • Pekka Nikander, Jari Arkko
    Pages 203-214
  16. Mobile IPv6 Security

    • Tuomas Aura
    Pages 215-234
  17. Concluding Discussion: Accounting for Resources

    • Bruce Christianson
    Pages 235-241

Other Volumes

  1. Security Protocols

About this book

Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was “Discerning the Protocol Participants.” Security protocols are usually described in terms of the active participants – Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know.

Editors and Affiliations

  • Computer Science Department, University of Hertfordshire,  

    Bruce Christianson

  • Computer Systems Group, Vrije Universiteit, Amsterdam, The Netherlands

    Bruno Crispo

  • Georgia Institute of Technology, Atlanta

    James A. Malcolm

  • Microsoft Research, Cambridge, UK

    Michael Roe

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access