rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783642038280

Foundations of Security Analysis and Design V

by ; ;
  • ISBN13:

    9783642038280

  • ISBN10:

    364203828X

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2009-09-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.99

Summary

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations.This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.

Table of Contents

Foundations of Security Analysis and Design
FOSAD 2007
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Propertiesp. 1
FOSAD 2008
An Introduction to Certificate Translationp. 51
Federated Identity Managementp. 96
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishmentp. 121
FOSAD 2009
Logic in Access Control (Tutorial Notes)p. 145
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocolsp. 166
Verification of Concurrent Programs with Chalicep. 195
Certified Static Analysis by Abstract Interpretationp. 223
Resource Usage Analysis and Its Application to Resource Certificationp. 258
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networksp. 289
Author Indexp. 339
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program