rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540326281

Formal Aspects in Security and Trust : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers

by ; ; ;
  • ISBN13:

    9783540326281

  • ISBN10:

    3540326286

  • Format: Paperback
  • Copyright: 2006-03-15
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $99.00 Save up to $79.20
  • Digital
    $42.90
    Add to Cart

    DURATION
    PRICE

Summary

This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005. The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Table of Contents

Voting technologies and trustp. 1
On the formal analyses of the Zhou-Gollmann non-repudiation protocolp. 5
Formal reasoning about a specification-based intrusion detection for dynamic auto-configuration protocols in ad hoc networksp. 16
A formal approach for reasoning about a class of Diffie-Hellman protocolsp. 34
Eliminating implicit information leaks by transformational typing and unificationp. 47
Abstract interpretation to check secure information flow in programs with input-output security annotationsp. 63
Opacity generalised to transition systemsp. 81
Unifying decidability results on protection systems using simulationsp. 96
Proof obligations preserving compilationp. 112
A logic for analysing subterfuge in delegation chainsp. 127
Probable innocence revisitedp. 142
Relative trustworthinessp. 158
Secure untrusted binaries - provably!p. 171
Normative specification : a tool for trust and securityp. 187
Type-based distributed access control vs. untyped attackersp. 203
A security management information model derivation framework : from goals to configurationsp. 217
On anonymity with identity escrowp. 235
Towards verification of timed non-repudiation protocolsp. 244
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program