Amazon cover image
Image from Amazon.com

Computer Security -- ESORICS 96 : 4th European Symposium on Research in Computer Security Rome, Italy, September 25-27, 1996 Proceedings / edited by Elisa Bertino, Helmut Kurth, Giancarlo Martella, Emilio Montolivo.

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 1146.Publication details: Berlin, Heidelberg : Springer Berlin Heidelberg, 1996.Description: 1 online resource (x, 365 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540706755
  • 3540706755
  • 3540617701
  • 9783540617709
Subject(s): Additional physical formats: Print version:: No titleDDC classification:
  • 005.43 23
LOC classification:
  • QA76.9.A25 E98 1996
Online resources: Summary: This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96. The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Includes bibliographical references and index.

This book constitutes the refereed proceedings of the 4th European Symposium on Research in Computer Security, ESORICS '96, held in Rome, Italy, in September 1996 in conjunction with the 1996 Italian National Computer Conference, AICA '96. The 21 revised full papers presented in the book were carefully selected from 58 submissions. They are organized in sections on electronic commerce, advanced access control models for database systems, distributed systems, security issues for mobile computing, network security, theoretical foundations of security, and secure database architectures.

Powered by Koha