Description |
1 online resource (x, 238 pages) : illustrations |
Series |
Lecture notes in computer science, 1611-3349 ; 6561 |
|
LNCS sublibrary. SL 4, Security and Cryptology |
|
Lecture notes in computer science ; 6561. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks -- Bounded Memory Dolev-Yao Adversaries in Collaborative Systems -- Efficient Decision Procedures for Message Deducibility and Static Equivalence -- Understanding Abstractions of Secure Channels -- Information Flow Analysis via Path Condition Refinement -- Foundations of Attack-Defense Trees -- Reasoning with Past to Prove PKCS#11 Keys Secure -- A Formal Analysis of Authentication in the TPM -- Modeling Identity-Related Properties and Their Privacy Strength -- Semantics of Trust -- Semi-automatic Synthesis of Security Policies by Invariant-Guided Abduction -- Corrective Enforcement of Security Policies -- Cryptographic Enforcement of Role-Based Access Control -- A Calculus for the Analysis of Wireless Network Security Protocols -- Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus |
Summary |
Annotation: This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies |
Bibliography |
Includes bibliographical references and author index |
Notes |
Print version record |
In |
Springer eBooks |
Subject |
Formal methods (Computer science) -- Congresses
|
|
Computer security -- Congresses
|
|
Information storage and retrieval systems.
|
|
Computer Security
|
|
Electronic Data Processing
|
|
Information Systems
|
|
Informatique.
|
|
Computer security
|
|
Formal methods (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Degano, Pierpaolo, 1950-
|
|
Etalle, Sandro.
|
|
Guttman, Joshua D.
|
ISBN |
9783642197512 |
|
3642197515 |
|
3642197507 |
|
9783642197505 |
|