Twelfth Annual Computer Security Applications Conference
IEEE Computer Society Press, 1996 - Computers - 249 pages
Proceedings of the December 1996 conference, offering papers on security engineering, secure links, electronic payment, cryptographic protocols, security architecture, firewalls, data base security, assurance, and SSE-CMM pilot results. Specific topics include the design of secure electronic payment schemes for the Internet, proxies for anonymous routing, security and the national telecommunications infrastructure, mandatory protection for Internet server software, and formal techniques for an IRSEC-E4 secure gateway. No index. Annotation copyrighted by Book News, Inc., Portland, OR.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Track A Wednesday
Implementing Security Policy in a Large Defense Procurement
17 other sections not shown
access control anonymous connection applets application approach architecture Assure attack audit authentication Camera capability client communication Computer Security configuration CORBA covert channel covert channel analysis cryptographic database DBMS DG/UX distributed domain e-cap E-Pump electronic purse enclave encrypted enforcement environment evaluation Figure firewall flow Fortezza functions Geldkarte hash high side host IEEE implementation Informix integrity Interactive Link interface Internet interoperability Java low side machine mechanisms merchant card multilevel multilevel security object manager onion routers onion routing proxy operating system ORB Gateway packet payment perform privileges problem protection protocol public key Pump requirements role Rubix schema security policy sends sensitivity label server smartcard specific subsystem Sybase tion traffic transaction trusted Trusted Information Systems type enforcement unidirectional UNIX untrusted user's X server XPatch