04684nam 22008415 450 99646592100331620200701165523.03-540-40981-510.1007/b94774(CKB)1000000000212276(SSID)ssj0000323208(PQKBManifestationID)11223085(PQKBTitleCode)TC0000323208(PQKBWorkID)10296599(PQKB)10607757(DE-He213)978-3-540-40981-6(MiAaPQ)EBC3087576(PPN)155222813(EXLCZ)99100000000021227620121227d2003 u| 0engurnn#008mamaatxtccrFormal Aspects of Security[electronic resource] First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers /edited by Ali E. Abdallah, Peter Ryan, Steve Schneider1st ed. 2003.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2003.1 online resource (X, 246 p.)Lecture Notes in Computer Science,0302-9743 ;2629Bibliographic Level Mode of Issuance: Monograph3-540-20693-0 Includes bibliographical references at the end of each chapters and index.Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems.Lecture Notes in Computer Science,0302-9743 ;2629Computer communication systemsData encryption (Computer science)Software engineeringOperating systems (Computers)Computers and civilizationManagement information systemsComputer scienceComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14045Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computer communication systems.Data encryption (Computer science).Software engineering.Operating systems (Computers).Computers and civilization.Management information systems.Computer science.Computer Communication Networks.Cryptology.Software Engineering.Operating Systems.Computers and Society.Management of Computing and Information Systems.005.8Abdallah Ali Eedthttp://id.loc.gov/vocabulary/relators/edtRyan Peteredthttp://id.loc.gov/vocabulary/relators/edtSchneider Steveedthttp://id.loc.gov/vocabulary/relators/edtFASec 2002MiAaPQMiAaPQMiAaPQBOOK996465921003316Formal Aspects of Security2065530UNISA