ISBN: 3-540-65663-4
TITLE: Security Protocols
AUTHOR: Christianson, Bruce; Crispo, Bruno; Harbison, William S.; Roe, Michael (Eds.)
TOC:

Inductive Analysis of the Internet Protocol TLS
Lawrence C. Paulson 1
Discussion 13
External Consistency and the Verification of Security Protocols
Simon N. Foley 24
Discussion 28
The Trust Shell Game
Carl Ellison 36
Discussion 41
Overview of the AT&T Labs Trust-Management Project
Joan Feigenbaum 45
Discussion 51
KeyNote: Trust Management for Public-Key Infrastructures
Matt Blaze, Joan Feigenbaum, Angelos D. Keromytis* 59
Discussion - Trust Management 64
Application-Oriented Security Policies and Their Composition
Virgil D. Gligor* and Serban I. Gavrila 67
Discussion 75
Secure Fingerprinting Using Public-Key Cryptography
Hiroshi Yoshiura, Ryoichi Sasaki* and Kazuo Takaragi 83
Discussion 90
Third Party Certification of HTTP Service Access Statistics
Francesco Bergadano and Pancrazio De Mauro 95
Discussion 100
Delegating Trust
William S. Harbison (Discussion) 108
Delegation of Responsibility
Bruno Crispo 118
Discussion 125
Abuse of Process
Mark Lomas (Discussion) 131
A New Concept in Protocols: Verifiable Computational Delegation 
Peter Landrock 137
Discussion 146
Delegation and Not-So Smart Cards
Bruce Christianson* and James A. Malcolm 154
Discussion 158
Certification and Delegation
Michael Roe (Discussion) 168
Discussion - Differences Between Academic and Commercial Security
Virgil Gligor, Peter Landrock, Mark Lomas, Raphael Yahalom and John Warne 177
Optimistic Trust with Realistic eNvestigators
Raphael Yahalom 193
Discussion 203
Insider Fraud
Dieter Gollmann 213
Discussion 220
Panel Session - Future Directions
Stewart Lee, Joan Feigenbaum, Virgil Gligor and Bruce Christianson
Chair: Roger Needham 227
Contributor Index 241

