This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Security Protocols, held in Cambridge, UK, in April 2004. The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through two rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, verification of cryptographic protocols, mobile ad-hoc network security, denial of service, SPKI, access control, timing attacks, API security, biometrics for security, and others.We suggest the use of an policy language which allows for override of denied access in some cases for increased flexibility. The overrides should be audited and we suggest that the access control policy can be used for finding the people who should perform the audit. ... Most manual administrative procedures are flexible enough to allow people to stretch the rules. In contrast, most ... We might also imagine a solution in the form of a system for requesting access rights as needed.
Title | : | Security Protocols |
Author | : | Bruce Christianson |
Publisher | : | Springer Science & Business Media - 2006-09-13 |
You must register with us as either a Registered User before you can Download this Book. You'll be greeted by a simple sign-up page.
Once you have finished the sign-up process, you will be redirected to your download Book page.
How it works: