Security Protocols

Security Protocols

4.11 - 1251 ratings - Source

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Security Protocols, held in Cambridge, UK, in April 2004. The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, verification of cryptographic protocols, mobile ad-hoc network security, denial of service, SPKI, access control, timing attacks, API security, biometrics for security, and others.We suggest the use of an policy language which allows for override of denied access in some cases for increased flexibility. The overrides should be audited and we suggest that the access control policy can be used for finding the people who should perform the audit. ... Most manual administrative procedures are flexible enough to allow people to stretch the rules. In contrast, most ... We might also imagine a solution in the form of a system for requesting access rights as needed.

Title:Security Protocols
Author: Bruce Christianson
Publisher:Springer Science & Business Media - 2006-09-13

You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.

Once you have finished the sign-up process, you will be redirected to your download Book page.

How it works:
  • 1. Register a free 1 month Trial Account.
  • 2. Download as many books as you like (Personal use)
  • 3. Cancel the membership at any time if not satisfied.

Click button below to register and download Ebook
Privacy Policy | Contact | DMCA