| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNICAMPANIAVAN00253354 |
|
|
Autore |
Burckel, Robert B. |
|
|
Titolo |
An Introduction to Classical Complex Analysis / Robert B. Burckel |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Basel ; Stuttgart, : Birkhäuser |
|
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910484812903321 |
|
|
Titolo |
Formal Aspects in Security and Trust : Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers / / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y A Ryan, Steve Schneider |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2007.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (VIII, 288 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 4691 |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Computer networks |
Cryptography |
Data encryption (Computer science) |
Operating systems (Computers) |
Computers and civilization |
Electronic data processing - Management |
Information storage and retrieval systems |
Computer Communication Networks |
Cryptology |
Operating Systems |
Computers and Society |
IT Operations |
Information Storage and Retrieval |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Strategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006. The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers include focus of formal aspects in security and trust policy models, security protocol design and analysis, and formal models of trust and reputation. |
|
|
|
|
|
|
|
| |