书目名称 | Security Protocols |
副标题 | 10th International W |
编辑 | Bruce Christianson,Bruno Crispo,Michael Roe |
视频video | |
概述 | Includes supplementary material: |
丛书名称 | Lecture Notes in Computer Science |
图书封面 |  |
描述 | Once again we bring you the proceedings of the International Workshop on Security Protocols. It seems hard to believe that we have reached the tenth event in this annual series. This year our theme was “Discerning the Protocol Participants.” Security protocols are usually described in terms of the active participants – Alice c- putes foo and sends it to Bob. However most security protocols also include o?-line participants, which are not synchronously involved in the exchange of messages: a bank may participate on behalf of a customer, and an arbiter may subsequently be asked to interpret the meaning of a run. These silent partners to the protocol have their own security policies, and assumptionsaboutidentity,authorizationandcapabilityneedtobere-examined when the agenda of a hidden participant may change. We hope that the position papers published here, which have been rewritten and rethought in the light of the discussions at the workshop, will be of interest, not just for the speci?c contributions they make but also for the deeper issues which they expose. In order to identify these issues more clearly, we include transcripts for some of the discussions which took place in Cambri |
出版日期 | Conference proceedings 2004 |
关键词 | Bridge; IPv6; Internet security; access control; authentication; communication; cryptographic protocols; in |
版次 | 1 |
doi | https://doi.org/10.1007/b94819 |
isbn_softcover | 978-3-540-20830-3 |
isbn_ebook | 978-3-540-39871-4Series ISSN 0302-9743 Series E-ISSN 1611-3349 |
issn_series | 0302-9743 |
copyright | Springer-Verlag Berlin Heidelberg 2004 |