Limit this search to....

Security Protocols: 6th International Workshop, Cambridge, Uk, April 15-17, 1998, Proceedings 1999 Edition
Contributor(s): Christianson, Bruce (Editor), Crispo, Bruno (Editor), Harbison, William S. (Editor)
ISBN: 3540656634     ISBN-13: 9783540656630
Publisher: Springer
OUR PRICE:   $52.24  
Product Type: Paperback - Other Formats
Published: February 1999
Qty:
Annotation: This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998.
The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the implications and effects of these upon such issues as authorization, security policy, and cryptosystems and component design.
Additional Information
BISAC Categories:
- Computers | Security - Cryptography
- Computers | Operating Systems - General
- Computers | Security - Networking
Dewey: 005.8
LCCN: 99-18462
Series: Lecture Notes in Computer Science,
Physical Information: 0.55" H x 6.14" W x 9.21" (0.81 lbs) 252 pages
 
Descriptions, Reviews, Etc.
Publisher Description:
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Security Protocols held in Cambridge, UK in April 1998.
The 15 revised papers presented as position statements are followed by transcripts of the discussions between the authors and the audience. Also included is a report on the final panel discussion on future directions in security protocols research and developments. Thus the volume reflects the lively interaction at the workshop. The papers are devoted to the interrelations between trust and delegation, exploring the implications and effects of these upon such issues as authorization, security policy, and cryptosystems and component design.