04631nam 22008415 450 991014362420332120251116234214.03-540-45608-210.1007/3-540-45608-2(CKB)1000000000211568(SSID)ssj0000323274(PQKBManifestationID)11277794(PQKBTitleCode)TC0000323274(PQKBWorkID)10299391(PQKB)11477515(DE-He213)978-3-540-45608-7(MiAaPQ)EBC3073133(PPN)155172085(BIP)13638628(BIP)7484922(EXLCZ)99100000000021156820121227d2001 u| 0engurnn#008mamaatxtccrFoundations of Security Analysis and Design Tutorial Lectures /edited by Riccardo Focardi, Roberto Gorrieri1st ed. 2001.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2001.1 online resource (VII, 405 p.)Lecture Notes in Computer Science,0302-9743 ;2171Bibliographic Level Mode of Issuance: Monograph3-540-42896-8 Includes bibliographical references at the end of each chapters and index.Mathematical Models of Computer Security -- The Logic of Authentication Protocols -- Access Control: Policies, Models, and Mechanisms -- Security Goals: Packet Trajectories and Strand Spaces -- Notes on Nominal Calculi for Security and Mobility -- Classification of Security Properties.Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents thoroughly revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September. Mathematical Models of Computer Security (Peter Y.A. Ryan); The Logic of Authentication Protocols (Paul Syversen and Iliano Cervesato); Access Control: Policies, Models, and Mechanisms (Pierangela Samarati and Sabrina de Capitani di Vimercati); Security Goals: Packet Trajectories and Strand Spaces (Joshua D. Guttman); Notes on Nominal Calculi for Security and Mobility (Andrew D. Gordon); Classification of Security Properties (Riccardo Focardi and Roberto Gorrieri).Lecture Notes in Computer Science,0302-9743 ;2171Computer securityData encryption (Computer science)Operating systems (Computers)Computer networksComputers and civilizationProgramming languages (Electronic computers)Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Programming Languages, Compilers, Interpretershttps://scigraph.springernature.com/ontologies/product-market-codes/I14037Computer security.Data encryption (Computer science)Operating systems (Computers)Computer networks.Computers and civilization.Programming languages (Electronic computers)Systems and Data Security.Cryptology.Operating Systems.Computer Communication Networks.Computers and Society.Programming Languages, Compilers, Interpreters.005.8Focardi Riccardoedthttp://id.loc.gov/vocabulary/relators/edtGorrieri Robertoedthttp://id.loc.gov/vocabulary/relators/edtInternational School on Foundations of Security Analysis and Design.MiAaPQMiAaPQMiAaPQBOOK9910143624203321Foundations of security analysis and design975652UNINA