logo
logo

logo
-
/ 5
votes

Security protocols

Security Protocols: 6th International Workshop Cambridge, UK, April 15–17, 1998 Proceedings<br />Author: Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe<br /> Published by Springer Berlin Heidelberg<br /> ISBN: 978-3-540-65663-0<br /> DOI: 10.1007/3-540-49135-X<br /><br />Table of Contents:<p></p><ul><li>Inductive Analysis of the Internet Protocol TLS

</li><li>Inductive Analysis of the Internet Protocol TLS </li><li>External Consistency and the Verification of Security Protocols </li><li>External Consistency and the Verification of Security Protocols </li><li>The Trust Shell Game </li><li>The Trust Shell Game </li><li>Overview of the AT&T Labs Trust-Management Project </li><li>Overview of the AT&T Labs Trust-Management Project </li><li>KeyNote: Trust Management for Public-Key Infrastructures </li><li>Discussion Session — Trust Management </li><li>Application-Oriented Security Policies and Their Composition </li><li>Application-Oriented Security Policies and Their Composition </li><li>Secure Fingerprinting Using Public-Key Cryptography </li><li>Secure Fingerprinting Using Public-Key Cryptography </li><li>Third Party Certification of HTTP Service Access Statistics </li><li>Third Party Certification of HTTP Service Access Statistics </li><li>Delegating Trust </li><li>Delegation of Responsibilities </li><li>Delegation of Responsibility </li><li>Abuse of Process</li></ul>