
Security Protocols: 6th International Workshop Cambridge, UK, April 15–17, 1998 Proceedings Author: Bruce Christianson, Bruno Crispo, William S. Harbison, Michael Roe Published by Springer Berlin Heidelberg ISBN: 978-3-540-65663-0 DOI: 10.1007/3-540-49135-X Table of Contents: Inductive Analysis of the Internet Protocol TLS Inductive Analysis of the Internet Protocol TLS External Consistency and the Verification of Security Protocols External Consistency and the Verification of Security Protocols The Trust Shell Game The Trust Shell Game Overview of the AT&T Labs Trust-Management Project Overview of the AT&T Labs Trust-Management Project KeyNote: Trust Management for Public-Key Infrastructures Discussion Session — Trust Management Application-Oriented Security Policies and Their Composition Application-Oriented Security Policies and Their Composition Secure Fingerprinting Using Public-Key Cryptography Secure Fingerprinting Using Public-Key Cryptography Third Party Certification of HTTP Service Access Statistics Third Party Certification of HTTP Service Access Statistics Delegating Trust Delegation of Responsibilities Delegation of Responsibility Abuse of Process
Page Count:
241
Publication Date:
1999-01-01
No comments yet. Be the first to share your thoughts!