Coverart for item
The Resource Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers, Bruce Christianson [and others] (eds.)

Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers, Bruce Christianson [and others] (eds.)

Label
Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
Title
Security protocols
Title remainder
11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
Statement of responsibility
Bruce Christianson [and others] (eds.)
Creator
Contributor
Subject
Genre
Language
eng
Summary
Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was "Where have all the Protocols gone?" Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion, openupnewlinesofinvestigation, and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I574 2005eb
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2003
http://bibfra.me/vocab/lite/meetingName
International Workshop on Security Protocols
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
Christianson, Bruce
Series statement
Lecture notes in computer science,
Series volume
3364
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Cryptography
  • Sécurité informatique
  • Ordinateurs
  • Cryptographie
  • COMPUTERS
  • COMPUTERS
  • COMPUTERS
  • Informatique
  • Computer security
  • Computers
  • Cryptography
  • Mobilfunk
  • Authentifikation
  • Telekommunikationsnetz
  • Mobile Computing
  • Sicherheitsprotokoll
  • Protocole de sécurité
  • Sécurité informatique
  • Cryptographie (Informatique)
  • Contrôle d'accès
  • IP
Label
Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers, Bruce Christianson [and others] (eds.)
Instantiates
Publication
Note
"11th in our series of International Workshops on Security Protocols"--Preface
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Where Have All the Protocols Gone? -- A Protocol's Life After Attacks ... -- A Protocol's Life After Attacks ... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- From Security Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust
Control code
262681819
Dimensions
unknown
Extent
1 online resource (ix, 349 pages)
Form of item
online
Isbn
9783540318361
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9783540283898
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-28389-8
Publisher number
11542322
Specific material designation
remote
System control number
(OCoLC)262681819
Label
Security protocols : 11th international workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers, Bruce Christianson [and others] (eds.)
Publication
Note
"11th in our series of International Workshops on Security Protocols"--Preface
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Where Have All the Protocols Gone? -- A Protocol's Life After Attacks ... -- A Protocol's Life After Attacks ... -- Towards Flexible Credential Negotiation Protocols -- Towards Flexible Credential Negotiation Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Man-in-the-Middle in Tunnelled Authentication Protocols -- Towards a Framework for Autonomic Security Protocols -- Towards a Framework for Autonomic Security Protocols -- Client v. Server Side Protocols, Interfaces and Storage -- Client v. Server Side Protocols, Interfaces and Storage -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Guaranteeing Access in Spite of Distributed Service-Flooding Attacks -- Protocol Codesign -- Protocol Codesign -- Enforcing Security Policies for Distributed Objects Applications -- Enforcing Security Policies for Distributed Objects Applications -- Regular SPKI -- Regular SPKI -- Federated Identity-Management Protocols -- Federated Identity-Management Protocols -- Enforcing the Unenforceable -- Is the Verification Problem for Cryptographic Protocols Solved? -- Secure Sessions from Weak Secrets -- Secure Sessions from Weak Secrets -- Panel Session: Is Protocol Modelling Finished? -- WAR: Wireless Anonymous Routing -- WAR: Wireless Anonymous Routing -- Limitations of IPsec Policy Mechanisms -- Limitations of IPsec Policy Mechanisms -- Deniable Authenticated Key Establishment for Internet Protocols -- Deniable Authenticated Key Establishment for Internet Protocols -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks -- What We Can Learn from API Security -- Addressing New Challenges by Building Security Protocols Around Graphs -- From Security Protocols to Systems Security -- From Security Protocols to Systems Security -- Biometrics to Enhance Smartcard Security -- Biometrics to Enhance Smartcard Security -- Blind Publication: A Copyright Library without Publication or Trust -- Blind Publication: A Copyright Library Without Publication or Trust
Control code
262681819
Dimensions
unknown
Extent
1 online resource (ix, 349 pages)
Form of item
online
Isbn
9783540318361
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
9783540283898
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-28389-8
Publisher number
11542322
Specific material designation
remote
System control number
(OCoLC)262681819

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...