Description |
1 online resource (viii, 284 pages) : illustrations |
Series |
Lecture notes in computer science, 0302-9743 ; 4691 |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 4691. 0302-9743
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Front Matter; Strategic Games on Defense Trees; Timed Calculus of Cryptographic Communication; A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk; Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security; Measuring Anonymity with Relative Entropy; Formalizing and Analyzing Sender Invariance; From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust; A Tool for the Synthesis of Controller Programs; Where Can an Insider Attack? |
|
Maintaining Information Flow Security Under Refinement and TransformationA Classification of Delegation Schemes for Attribute Authority; Program Partitioning Using Dynamic Trust Models; Locality-Based Security Policies; A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols; A Formal Specification of the MIDP 2.0 Security Model; A Comparison of Semantic Models for Noninterference; Hiding Information in Multi Level Security Systems; A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks; Back Matter |
Summary |
This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006. The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID is |
Analysis |
computers |
|
samenleving |
|
society |
|
informatieontsluiting |
|
information retrieval |
|
informatieopslag |
|
information storage |
|
informatiesystemen |
|
information systems |
|
computerwetenschappen |
|
computer sciences |
|
computernetwerken |
|
computer networks |
|
gegevensbeheer |
|
data management |
|
operating systems |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and index |
Notes |
Print version record |
Subject |
Computer security -- Congresses
|
|
Formal methods (Computer science) -- Congresses
|
|
Trust -- Congresses
|
|
Formal methods (Computer science)
|
|
Trust.
|
|
Computer security.
|
|
Informatique.
|
|
Computer security
|
|
Formal methods (Computer science)
|
|
Trust
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Dimitrakos, Theo.
|
ISBN |
9783540752271 |
|
3540752277 |
|
9783540752264 |
|
3540752269 |
|