Security Protocols: 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings 1999 Edition Contributor(s): Christianson, Bruce (Editor), Crispo, Bruno (Editor), Harbison, William S. (Editor) |
|
![]() |
ISBN: 3540656634 ISBN-13: 9783540656630 Publisher: Springer OUR PRICE: $52.24 Product Type: Paperback - Other Formats Published: February 1999 Annotation: This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998. The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the implications and effects of these upon such issues as authorization, security policy, and cryptosystems and component design. |
Additional Information |
BISAC Categories: - Computers | Security - Cryptography - Computers | Operating Systems - General - Computers | Security - Networking |
Dewey: 005.8 |
LCCN: 99-18462 |
Series: Lecture Notes in Computer Science, |
Physical Information: 0.55" H x 6.14" W x 9.21" (0.81 lbs) 252 pages |
Descriptions, Reviews, Etc. |
Publisher Description: This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998. The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the implications and effects of these upon such issues as authorization, security policy, and cryptosystems and component design. |