ISBN-10:
3642197507
ISBN-13:
9783642197505
Pub. Date:
04/28/2011
Publisher:
Springer Berlin Heidelberg
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers / Edition 1

Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers / Edition 1

Paperback

Current price is , Original price is $89.99. You
Select a Purchase Option (2011)
  • purchase options
    $73.24 $89.99 Save 19% Current price is $73.24, Original price is $89.99. You Save 19%.
  • purchase options

Product Details

ISBN-13: 9783642197505
Publisher: Springer Berlin Heidelberg
Publication date: 04/28/2011
Series: Lecture Notes in Computer Science , #6561
Edition description: 2011
Pages: 239
Product dimensions: 6.10(w) x 9.25(h) x 0.02(d)

Table of Contents

Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks (Invited Talk) Dusko Pavlovic 1

Bounded Memory Dolev-Yao Adversaries in Collaborative Systems Max Kanovich Tajana Ban Kirigin Vivek Nigam Andre Scedrov 18

Efficient Decision Procedures for Message Deducibility and Static Equivalence Bruno Conchinha David Basin Carlos Caleiro 34

Understanding Abstractions of Secure Channels Allaa Kamil Gavin Lowe 50

Information Flow Analysis via Path Condition Refinement Mana Taghdiri Gregor Snelting Carsten Sinz 65

Foundations of Attack-Defense Trees Barbara Kordy Sjouke Mauw Sa ša Radomirovic Patrick Schweitzer 80

Reasoning with Past to Prove PKCS#11 Keys Secure Sibylle Fröschle Nils Sommer 96

A Formal Analysis of Authentication in the TPM Stéphanic Delaune Steve Kremer Mark D. Ryan Graham Steel 111

Modeling Identity-Related Properties and Their Privacy Strength Meilof Veeningen Benne de Weger Nicola Zannone 126

Semantics of Trust Tim Mutter 141

Semi-automatic Synthesis of Security Policies by Invariant-Guided Abduction Clément Hurlin Hèléne Kirchner 157

Corrective Enforcement of Security Policies Raphael Khoury Nadia Tawbi 176

Cryptographic Enforcement of Role-Based Access Control Jason Crampton 191

A Calculus for the Analysis of Wireless Network Security Protocols Francesco Ballardin Massimo Merro 206

Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus Naipeng Dong Hugo Jonker Jun Pang 223

Author Index 239

Customer Reviews

Most Helpful Customer Reviews

See All Customer Reviews