Staff View for: Formal aspects in security and trust : 5

 Staff view

You must be logged in to Tag Records

Formal aspects in security and trust [electronic resource] : 5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 : revised selected papers /

Pierpaolo Degano, Joshua Guttmann, Fabio Martinelli (eds.).

Book Cover
Names: Degano, Pierpaolo, | Guttmann, Joshua. | Martinelli, Fabio,
Published: Berlin ; Springer, c2009.
Series: LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 5491.
Topics: Computer security - Congresses. | Formal methods (Computer science) - Congresses. | Trust - Congresses.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 03067cam a2200433Ia 4500
001 11123674
005 20140621205451.0
006 m d
007 cr unu
008 090413s2009 gw a sb 101 0 eng d
020 |a9783642014659
020 |a3642014658
035 |a(OCoLC)ocn318369388
035 |a(IITdb)806108
037 |a978-3-642-01465-9|bSpringer|nhttp://www.springerlink.com
040 |aCUS|cCUS|dC$Q|dIITdb
049 |aILLA
050 4|aQA76.9.A25|bF36 2008
111 2 |aFAST 2008|d(2008 :|cMálaga, Spain)
245 10|aFormal aspects in security and trust|h[electronic resource] :|b5th international workshop, FAST 2008, Malaga, Spain, October 9-10, 2008 : revised selected papers /|cPierpaolo Degano, Joshua Guttmann, Fabio Martinelli (eds.).
260 |aBerlin ;|aNew York :|bSpringer,|cc2009.
300 |ax, 330 p. :|bdigital, PDF file
440 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology
490 1 |aLecture notes in computer science,|x0302-9743 ;|v5491
500 |aTitle from PDF t.p. (SpringerLink, viewed Apr. 10, 2009).
504 |aIncludes bibliographical references and index.
505 0 |aFormal certification of EIGamal encryption -- Secure information flow as a safety property -- Who can declassify? -- Non-interference for deterministic interactive programs -- Information-theoretic modeling and analysis of interrupt-related covert channels -- Causality and accountability -- Dynamics, robustness and fragility of trust -- Trust within the context of organizations : A formal approach -- Know what you trust -- Privacy-friendly electronic traffic pricing via commits -- A formal privacy management framework -- Parameterised anonymity -- Automatic methods for analyzing non-repudiation protocols with an active intruder -- Petri net security checker : Structural non-interference at work -- Verifying multi-party authentication using rank functions and PVS -- The append-only web bulletin board -- Secure broadcast ambients -- Extending anticipation games with location, penalty and timeline -- Do you really mean what you actually enforced? -- Delegating privileges over finite resources : A quota based delegation approach -- Access control and information flow in transactional memory.
538 |aMode of access: World Wide Web.
650 0|aComputer security|vCongresses.
650 0|aFormal methods (Computer science)|vCongresses.
650 0|aTrust|vCongresses.
700 1 |aDegano, Pierpaolo,|d1950-
700 1 |aGuttmann, Joshua.
700 1 |aMartinelli, Fabio,|d1969-
776 08|iPrint version:|aFAST 2008 (2008 : Málaga, Spain).|tFormal aspects in security and trust.|dBerlin ; New York : Springer, c2009|z9783642014642
830 0|aLecture notes in computer science ;|v5491.
852 0 |bGER|hQA76.9.A25|iF36 2008eb
856 40|3SpringerLink|uhttps://ezproxy.gl.iit.edu/login?url=http://dx.doi.org/10.1007/978-3-642-01465-9|zAccess to the electronic version for current IIT main & branch campus students, faculty, & staff.
994 |a92|bILL

Staff View for: Formal aspects in security and trust : 5