Matches in Harvard for { <http://id.lib.harvard.edu/aleph/009328941/catalog> ?p ?o. }
Showing items 1 to 33 of
33
with 100 items per page.
- catalog abstract "Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was “Discerning the Protocol Participants.” Security protocols are usually described in terms of the active participants – Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know.".
- catalog contributor b13171494.
- catalog contributor b13171495.
- catalog created "2004.".
- catalog date "2004".
- catalog date "2004.".
- catalog dateCopyrighted "2004.".
- catalog description "Includes bibliographical references and index.".
- catalog description "Introduction / Bruce Christianson -- Keynote Address / Roger M. Needham -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties / Jari Arkko and Pekka Nikander -- Is Entity Authentication Necessary? / Chris J. Mitchell and Paulo S. Pagliusi.".
- catalog description "Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was “Discerning the Protocol Participants.” Security protocols are usually described in terms of the active participants – Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambridge during the workshop. What would you have liked to add? Do let us know.".
- catalog extent "241 p. :".
- catalog identifier "3540208305 (alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 2845".
- catalog issued "2004".
- catalog issued "2004.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer-Verlag,".
- catalog subject "005.8 22".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security Congresses.".
- catalog subject "Computer software.".
- catalog subject "Computers Access control Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Information Systems.".
- catalog subject "Operating systems (Computers).".
- catalog subject "QA76.9.A25 I574 2004".
- catalog tableOfContents "Introduction / Bruce Christianson -- Keynote Address / Roger M. Needham -- Weak Authentication: How to Authenticate Unknown Principals without Trusted Parties / Jari Arkko and Pekka Nikander -- Is Entity Authentication Necessary? / Chris J. Mitchell and Paulo S. Pagliusi.".
- catalog title "Security protocols : 10th international workshop, Cambridge, UK, April 17-19, 2002 : revised papers / Bruce Christianson ... [et al.] (eds.).".
- catalog type "Cambridge (2002) swd".
- catalog type "Conference proceedings. fast".
- catalog type "text".