Computer Security: ESORICS ...Springer,., 1996 - Computer security |
Contents
Electronic Commerce | 1 |
LightWeight Microcash Payment for the Internet | 32 |
Advanced Access Control Models | 63 |
Copyright | |
15 other sections not shown
Other editions - View all
Common terms and phrases
access control algorithm Alice Alice's allows analysis anonymity application attack AutA,B authentication Bell-LaPadula model blind signature buffer manager buffer slots certificate coins components Computer Computer Security concept confidence value CONFIDENTIAL consider constraints covert channels cryptographic cryptographic protocols data item database defined definition delivery agent denoted derived digital signature discrete logarithm electronic commerce encryption entities example execution federation global hash function IEEE information flows initial Internet label lattice LBAC level transaction lock mail item merchant method multilevel secure Needham-Schroeder non-repudiation operations P₁ paper Petri nets private key problem Proceedings public key query random RBAC replication request role hierarchies roles Section security level security orderings semantics sender specification stateless object strictly dominated subset task techniques threat scenario token trust tuples UNIVERSITY OF CALIFORNIA verify workflow write write-pin