Cargando…

Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009. The 12 revised full papers pre...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Degano, Pierpaolo (Editor ), Viganò, Luca (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edición:1st ed. 2009.
Colección:Security and Cryptology ; 5511
Temas:
Acceso en línea:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-03459-6
003 DE-He213
005 20220115042822.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642034596  |9 978-3-642-03459-6 
024 7 |a 10.1007/978-3-642-03459-6  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Foundations and Applications of Security Analysis  |h [electronic resource] :  |b Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers /  |c edited by Pierpaolo Degano, Luca Viganò. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a X, 223 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 5511 
505 0 |a A Policy Model for Secure Information Flow -- A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference -- Validating Security Protocols under the General Attacker -- Usage Automata -- Static Detection of Logic Flaws in Service-Oriented Applications -- Improving the Semantics of Imperfect Security -- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data -- Transformations between Cryptographic Protocols -- Formal Validation of OFEPSP+ with AVISPA -- On the Automated Correction of Protocols with Improper Message Encoding -- Finite Models in FOL-Based Crypto-Protocol Verification -- Towards a Type System for Security APIs -- Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption -- How Many Election Officials Does It Take to Change an Election?. 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009. The 12 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 27 submissions. The papers feature topics including formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, the modeling of information flow and its application to confidentiality policies, system composition and covert channel analysis. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Coding theory. 
650 0 |a Computer networks . 
650 0 |a Algorithms. 
650 0 |a Computer engineering. 
650 1 4 |a Cryptology. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Algorithms. 
650 2 4 |a Computer Engineering and Networks. 
700 1 |a Degano, Pierpaolo.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Viganò, Luca.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642034602 
776 0 8 |i Printed edition:  |z 9783642034589 
830 0 |a Security and Cryptology ;  |v 5511 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-03459-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)