Cargando…

Foundations of Security Analysis and Design III FOSAD 2004/2005 Tutorial Lectures /

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspec...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Aldini, Alessandro (Editor ), Gorrieri, Roberto (Editor ), Martinelli, Fabio (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2005.
Edición:1st ed. 2005.
Colección:Security and Cryptology ; 3655
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-540-31936-8
003 DE-He213
005 20230810201508.0
007 cr nn 008mamaa
008 100726s2005 gw | s |||| 0|eng d
020 |a 9783540319368  |9 978-3-540-31936-8 
024 7 |a 10.1007/11554578  |2 doi 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Foundations of Security Analysis and Design III  |h [electronic resource] :  |b FOSAD 2004/2005 Tutorial Lectures /  |c edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli. 
250 |a 1st ed. 2005. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2005. 
300 |a VIII, 276 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 3655 
505 0 |a FOSAD 2004 (6-11 September 2004) -- Justifying a Dolev-Yao Model Under Active Attacks -- Model-Based Security Engineering with UML -- A Tutorial on Physical Security and Side-Channel Attacks -- Static Analysis of Authentication -- FOSAD 2005 (19-24 September 2005) -- Formal Methods for Smartcard Security -- Privacy-Preserving Database Systems -- Intrusion Detection: Introduction to Intrusion Detection and Security Information Management -- Security and Trust Requirements Engineering. 
520 |a The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The "Int- national School on Foundations of Security Analysis and Design" (FOSAD, see http://www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea,especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http://www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer's LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005. 
650 0 |a Data protection. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Operating systems (Computers). 
650 0 |a Computer networks . 
650 0 |a Electronic data processing  |x Management. 
650 0 |a Computer science. 
650 1 4 |a Data and Information Security. 
650 2 4 |a Cryptology. 
650 2 4 |a Operating Systems. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a IT Operations. 
650 2 4 |a Computer Science Logic and Foundations of Programming. 
700 1 |a Aldini, Alessandro.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Gorrieri, Roberto.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Martinelli, Fabio.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783540815662 
776 0 8 |i Printed edition:  |z 9783540289555 
830 0 |a Security and Cryptology ;  |v 3655 
856 4 0 |u https://doi.uam.elogim.com/10.1007/11554578  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)