𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Security Protocols: 11th International Workshop, Cambridge, UK, April 2-4, 2003, Revised Selected Papers (Lecture Notes in Computer Science, 3364)

✍ Scribed by Bruce Christianson (editor), Bruno Crispo (editor), James A. Malcolm (editor), Michael Roe (editor)


Publisher
Springer
Year
2005
Tongue
English
Leaves
360
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was β€œWhere have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applications, or in specialised hardware. Does this trend lead to better security architectures, or is it an indication that we are addressing the wrong problems? The intention of the workshops is to provide a forum where incompletely workedoutideascanstimulatediscussion,openupnewlinesofinvestigation,and suggestmoreproblems. The positionpaperspublished herehavebeen revisedby the authors in the light of their participation in the workshop. In addition, we publish edited transcripts of some of the discussions, to give our readers access to some of the roads ahead not (yet) taken. We hope that these revised position papers and edited transcripts will give you at least one interesting idea of your own to explore. Please do write and tell us what it was. Our purpose in publishing these proceedings is to produce a conceptual map which will be of enduring interest, rather than to be merely topical. This is perhaps just as well, given the delay in production. This year we moved to new computer-based recording technology, and of course it failed completely.

✦ Table of Contents


Frontmatter
Where Have All the Protocols Gone?
A Protocol's Life After Attacks...
A Protocol's Life After Attacks...
Towards Flexible Credential Negotiation Protocols
Towards Flexible Credential Negotiation Protocols
Man-in-the-Middle in Tunnelled Authentication Protocols
Man-in-the-Middle in Tunnelled Authentication Protocols
Towards a Framework for Autonomic Security Protocols
Towards a Framework for Autonomic Security Protocols
Client v. Server Side Protocols, Interfaces and Storage
Client v. Server Side Protocols, Interfaces and Storage
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
Guaranteeing Access in Spite of Distributed Service-Flooding Attacks
Protocol Codesign
Protocol Codesign
Enforcing Security Policies for Distributed Objects Applications
Enforcing Security Policies for Distributed Objects Applications
Regular SPKI
Regular SPKI
Federated Identity-Management Protocols
Federated Identity-Management Protocols
Enforcing the Unenforceable
Is the Verification Problem for Cryptographic Protocols Solved?
Secure Sessions from Weak Secrets
Secure Sessions from Weak Secrets
Panel Session: Is Protocol Modelling Finished?
WAR: Wireless Anonymous Routing
WAR: Wireless Anonymous Routing
Limitations of IPsec Policy Mechanisms
Limitations of IPsec Policy Mechanisms
Deniable Authenticated Key Establishment for Internet Protocols
Deniable Authenticated Key Establishment for Internet Protocols
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks
What We Can Learn from API Security
Addressing New Challenges by Building Security Protocols Around Graphs
From Security Protocols to Systems Security
From Security Protocols to Systems Security
Biometrics to Enhance Smartcard Security
Biometrics to Enhance Smartcard Security
Blind Publication: A Copyright Library without Publication or Trust
Blind Publication: A Copyright Library Without Publication or Trust
Backmatter


πŸ“œ SIMILAR VOLUMES


Security Protocols: 11th International W
✍ Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, πŸ“‚ Library πŸ“… 2005 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was β€œWhere have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applica

Security Protocols: 11th International W
✍ Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, πŸ“‚ Library πŸ“… 2005 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Greetings. These are the proceedings of the 11th in our series of International Workshops on Security Protocols. Our theme this time was β€œWhere have all the Protocols gone?” Once upon a time security protocols lived mainly in the network and transport layers. Now they increasingly hide in applica

Security Protocols: 12th International W
✍ Bruce Christianson (editor), Bruno Crispo (editor), James A. Malcolm (editor), M πŸ“‚ Library πŸ“… 2006 πŸ› Springer 🌐 English

<span>Here are the proceedings of the 12th International Workshop on Security P- tocols. We hope that you will enjoy them, and that they will cause you to think at least one heretical thought. Please write or e-mail and share it with us. Our theme this workshop was β€œAuthentic Privacy.” Traditionally

Security Protocols: 8th International Wo
✍ Bruce Christianson (editor), Bruno Crispo (editor), James A. Malcolm (editor), M πŸ“‚ Library πŸ“… 2001 πŸ› Springer 🌐 English

<span>The Cambridge International Workshop on Security Protocols has now run for eight years. Each year we set a theme, focusing upon a speci?c aspect of security protocols, and invite position papers. Anybody is welcome to send us a position paper (yes, you are invited) and we don’t insist they rel

Security Protocols: 13th International W
✍ Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, πŸ“‚ Library πŸ“… 2007 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Welcome to the Proceedings of the 13th International Security Protocols Wo- shop. As usual, our meeting in Cambridge was just the beginning. After that, position papers were revised (often more than once) and transcripts were c- culated, discussed, and edited several times: our intention was not

Security Protocols: 12th International W
✍ Bruce Christianson (auth.), Bruce Christianson, Bruno Crispo, James A. Malcolm, πŸ“‚ Library πŸ“… 2006 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>Here are the proceedings of the 12th International Workshop on Security P- tocols. We hope that you will enjoy them, and that they will cause you to think at least one heretical thought. Please write or e-mail and share it with us. Our theme this workshop was β€œAuthentic Privacy.” Traditionally we