1.

Record Nr.

UNISA996465278403316

Titolo

Formal Aspects in Security and Trust [[electronic resource] ] : 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers / / edited by Pierpaolo Degano, Joshua D. Guttman

Pubbl/distr/stampa

Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010

ISBN

1-280-38625-8

9786613564177

3-642-12459-3

Edizione

[1st ed. 2010.]

Descrizione fisica

1 online resource (X, 279 p. 46 illus.)

Collana

Security and Cryptology ; ; 5983

Disciplina

004.6

Soggetti

Computer communication systems

Data encryption (Computer science)

Computer security

Computers and civilization

Management information systems

Computer science

Information storage and retrieval

Computer Communication Networks

Cryptology

Systems and Data Security

Computers and Society

Management of Computing and Information Systems

Information Storage and Retrieval

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Invited Lecture -- Semantics and Enforcement of Expressive Information Flow Policies -- Session 1. Trust -- An Algebra for Trust Dilution and Trust Fusion -- HMM-Based Trust Model -- Deriving Trust from Experience -- Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties -- Session 2. Workflow and Orchestration



-- Model Checking of Security-Sensitive Business Processes -- Session 3. Secure Flow -- Analysing the Information Flow Properties of Object-Capability Patterns -- Applied Quantitative Information Flow and Statistical Databases -- Specification and Verification of Side Channel Declassification -- Secure Information Flow for Distributed Systems -- Session 4. Mobility and Deniability -- Probable Innocence in the Presence of Independent Knowledge -- A Calculus of Trustworthy Ad Hoc Networks -- Session 5. Protocols 1 -- Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties -- Game-Based Verification of Multi-Party Contract Signing Protocols -- Attack, Solution and Verification for Shared Authorisation Data in TCG TPM -- Session 6. Protocols 2 -- Trusted Multiplexing of Cryptographic Protocols -- Specifying and Modelling Secure Channels in Strand Spaces -- Session 7. Protocols 3 -- Integrating Automated and Interactive Protocol Verification -- A User Interface for a Game-Based Protocol Verification Tool.