Staff View for: Formal aspects in security and trust : 5

 Staff view

You must be logged in to Tag Records

Formal aspects in security and trust : 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers /

Pierpaolo Degano, Joshua Guttmann, Fabio Martinelli (eds.).

Book Cover
Names: Degano, Pierpaolo, | Guttmann, Joshua. | Martinelli, Fabio,
Published: Berlin : Springer, 2009.
Series: Lecture notes in computer science ; 5491.
Topics: Computer security - Congresses. | Computer networks - Security measures - Congresses. | Cryptography - Congresses. | Computer networks - Security measures. | Cryptography. | Computer security. | Informatique.
Genres: Electronic books. | Conference papers and proceedings.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 05091cam a2200685Ia 4500
001 10759971
005 20181017202955.0
006 m o d
007 cr cn|||||||||
008 090622s2009 gw a ob 101 0 eng d
019 |a318369388|a370601502|a488555189|a647699862|a858873107|a880323871
020 |a9783642014659
020 |a3642014658
020 |z9783642014642|q(pbk.)
020 |z364201464X|q(pbk.)
035 |a(OCoLC)ocn405546170
035 |a(UIUdb)5961526
037 |a978-3-642-01464-2|bSpringer|nhttp://www.springerlink.com
040 |aGW5XE|beng|epn|cGW5XE|dOCLCQ|dHUA|dE7B|dOCLCQ|dCUS|dC$Q|dLEAUB|dOCLCQ|dOCLCA|dIAD|dVT2|dOCLCO|dOCLCF|dBEDGE|dDKDLA|dOHS|dOCLCQ|dCOO|dOCLCO|dYDXCP|dSLY|dOCLCO|dOCL|dOCLCO|dOCLCQ|dOCLCO|dEBLCP|dOCLCQ|dOCLCO|dOCLCQ|dDGU|dOCLCA|dUAB|dESU|dOCLCQ|dOCLCA|dBUF|dUIU|dUIUdb
049 |aUIUU
050 4|aQA76.9.A25|bF37 2009
060 4|aQA 76.9.A25
072 7|aQA|2lcco
082 04|a005.8|222
084 |aTP309-532|2clc
111 2 |aFAST (Workshop)|n(5th :|d2008 :|cMalaga, Spain)
245 10|aFormal aspects in security and trust :|b5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 ; revised selected papers /|cPierpaolo Degano, Joshua Guttmann, Fabio Martinelli (eds.).
246 3 |aFAST 2008
260 |aBerlin :|bSpringer,|c2009.
300 |a1 online resource (x, 330 pages) :|billustrations.
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
490 1 |aLecture notes in computer science,|x0302-9743 ;|v5491
504 |aIncludes bibliographical references and index.
505 0 |aFormal certification of EIGamal encryption -- Secure information flow as a safety property -- Who can declassify? -- Non-interference for deterministic interactive programs -- Information-theoretic modeling and analysis of interrupt-related covert channels -- Causality and accountability -- Dynamics, robustness and fragility of trust -- Trust within the context of organizations : A formal approach -- Know what you trust -- Privacy-friendly electronic traffic pricing via commits -- A formal privacy management framework -- Parameterised anonymity -- Automatic methods for analyzing non-repudiation protocols with an active intruder -- Petri net security checker : Structural non-interference at work -- Verifying multi-party authentication using rank functions and PVS -- The append-only web bulletin board -- Secure broadcast ambients -- Extending anticipation games with location, penalty and timeline -- Do you really mean what you actually enforced? -- Delegating privileges over finite resources : A quota based delegation approach -- Access control and information flow in transactional memory.
520 8 |aAnnotation This book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Formal Aspects in Security and Trust, FAST 2008, held under the auspices of IFIP WG 1.7 in Malaga, Spain, in October 2008 as a satellite event of 13th European Symposium on Research in Computer Security. The 20 revised papers presented were carefully reviewed and selected from 59 submissions. The papers focus of formal aspects in security, trust and reputation, security protocol design and analysis, logics for security and trust, trust-based reasoning, distributed trust management systems, digital asset protection, data protection, privacy and id management issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, Web/grid services security/trust/privacy, security and risk assessment, resource and access control, as well as case studies.
588 0 |aPrint version record.
650 0|aComputer security|vCongresses.
650 0|aComputer networks|xSecurity measures|vCongresses.
650 0|aCryptography|vCongresses.
650 07|aComputer networks|xSecurity measures.|2cct
650 07|aCryptography.|2cct
650 07|aComputer security.|2cct
650 7|aInformatique.|2eclas
650 7|aComputer networks|xSecurity measures.|2fast|0(OCoLC)fst00872341
650 7|aComputer security.|2fast|0(OCoLC)fst00872484
650 7|aCryptography.|2fast|0(OCoLC)fst00884552
655 4|aElectronic books.
655 7|aConference papers and proceedings.|2fast|0(OCoLC)fst01423772
700 1 |aDegano, Pierpaolo,|d1950-
700 1 |aGuttmann, Joshua.
700 1 |aMartinelli, Fabio,|d1969-
776 08|iPrint version:|aFAST 2008 (2008 : Malaga, Spain).|tFormal aspects in security and trust.|dBerlin : Springer, 2009|z9783642014642|z364201464X|w(OCoLC)319496994
830 0|aLecture notes in computer science ;|v5491.
856 40|3SpringerLink - Full text online|uhttp://www.library.illinois.edu/proxy/go.php?url=http://dx.doi.org/10.1007/978-3-642-01465-9|xUIU
938 |aEBL - Ebook Library|bEBLB|nEBL3064114
938 |aebrary|bEBRY|nebr10289807
938 |aYBP Library Services|bYANK|n3075185
994 |aC0|bUIU

Staff View for: Formal aspects in security and trust : 5