LEADER 01512nam0 2200385 450 001 000041471 005 20150910120004.0 010 $a978-88-08-26148-9 100 $a20150907d2014----km-y0itaa50------ba 101 1 $aita 102 $aIT 200 1 $a<> principi di biochimica di Lehninger$fDavid L. Nelson, Michael M. Cox$gedizione italiana a cura di Edon Melloni e Franca Salamino 205 $a6. ed 210 $aBologna$cZanichelli$d2014 215 $aXXVI, 1286 p.$cill.$d30 cm. 300 $aTraduzione di Roberto Stifanese 300 $aSul frontespizio: Libro multimediale 454 1$12001$aLehninger: Principles of Biochemistry$914763 606 1 $aBiochimica 676 $a572$v(22. ed.)$9Biochimica 700 1$aLehninger,$bAlbert L$016602 701 1$aNelson,$bDavid L.$062724 701 1$aCox,$bMichael M.$062723 702 1$aMelloni$bEdon 702 1$aSalamino,$bFranca 702 1$aStifanese,$bRoberto 801 0$aIT$bUniversità della Basilicata - B.I.A.$gREICAT$2unimarc 912 $a000041471 996 $aLehninger principles of biochemistry$914763 997 $aUNIBAS CAT $aSTD102$b00$c20150907$lBAS01$h1148 CAT $aTTM$b30$c20150910$lBAS01$h1200 FMT Z30 -1$lBAS01$LBAS01$mBOOK$1BASA2$APolo Tecnico-Scientifico$2DID$BDidattica$3C1.P3.3$6113874$5T113874$820150908$f98$FConsultazione Z30 -1$lBAS01$LBAS01$mBOOK$1BASA2$APolo Tecnico-Scientifico$2DID$BDidattica$3PTS.d1.114558$6114558$5T114558$820160608$f04$FPrestabile Didattica LEADER 05995nam 22008655 450 001 9910484167003321 005 20251226203047.0 010 $a1-280-38625-8 010 $a9786613564177 010 $a3-642-12459-3 024 7 $a10.1007/978-3-642-12459-4 035 $a(CKB)2670000000017280 035 $a(SSID)ssj0000446470 035 $a(PQKBManifestationID)11271325 035 $a(PQKBTitleCode)TC0000446470 035 $a(PQKBWorkID)10491228 035 $a(PQKB)11457676 035 $a(DE-He213)978-3-642-12459-4 035 $a(MiAaPQ)EBC3065230 035 $a(PPN)149073275 035 $a(BIP)30071976 035 $a(EXLCZ)992670000000017280 100 $a20100429d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFormal Aspects in Security and Trust $e6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers /$fedited by Pierpaolo Degano, Joshua D. Guttman 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 279 p. 46 illus.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5983 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-12458-5 320 $aIncludes bibliographical references and index. 327 $aInvited Lecture -- Semantics and Enforcement of Expressive Information Flow Policies -- Session 1. Trust -- An Algebra for Trust Dilution and Trust Fusion -- HMM-Based Trust Model -- Deriving Trust from Experience -- Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties -- Session 2. Workflow and Orchestration -- Model Checking of Security-Sensitive Business Processes -- Session 3. Secure Flow -- Analysing the Information Flow Properties of Object-Capability Patterns -- Applied Quantitative Information Flow and Statistical Databases -- Specification and Verification of Side Channel Declassification -- Secure Information Flow for Distributed Systems -- Session 4. Mobility and Deniability -- Probable Innocence in the Presence of Independent Knowledge -- A Calculus of Trustworthy Ad Hoc Networks -- Session 5. Protocols 1 -- Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties -- Game-Based Verification of Multi-Party Contract Signing Protocols -- Attack, Solution and Verification for Shared Authorisation Data in TCG TPM -- Session 6. Protocols 2 -- Trusted Multiplexing of Cryptographic Protocols -- Specifying and Modelling Secure Channels in Strand Spaces -- Session 7. Protocols 3 -- Integrating Automated and Interactive Protocol Verification -- A User Interface for a Game-Based Protocol Verification Tool. 330 $aThe present volume contains the proceedings of the 6th International workshop on Formal Aspects of Security and Trust (fast 2009), held in Eindhoven, The Netherlands, 5-6 November 2009, as part of Formal Methods Week 2009. fast is sponsored by IFIP WG 1.7 on Foundations of Security Analysis and Design. The previous ?ve fast workshop editions have fostered cooperation among researchers in the areas of security and trust, and we aimed to continue this tradition. As computing and networkinfrastructures become increasingly per- sive, and as they carry increasing economic activity, society needs well-matched security and trust mechanisms. These interactions increasingly span several - terprises and involve loosely structured communities of individuals. Participants in these activities must control interactions with their partners based on trust policies and business logic. Trust-based decisions e'ectively determine the se- ritygoalsforsharedinformationandfor accessto sensitiveorvaluableresources. fast sought original papers focusing of formal aspects of: security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed trust management s- tems; trust-based reasoning; digital assets protection; data protection; privacy and id issues; information ?ow analysis; language-based security; security and trust aspects in ubiquitous computing; validation/analysis tools; Web service security/trust/privacy; grid security; security risk assessment; and case studies. The fast proceedings contain--in addition to an abstract of the invited talk by Anindya Banerjee--revisionsoffull papersacceptedforpresentationat fast. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5983 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aInformation storage and retrieval systems 606 $aComputer Communication Networks 606 $aCryptology 606 $aData and Information Security 606 $aComputers and Society 606 $aIT Operations 606 $aInformation Storage and Retrieval 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 0$aInformation storage and retrieval systems. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aComputers and Society. 615 24$aIT Operations. 615 24$aInformation Storage and Retrieval. 676 $a004.6 701 $aDegano$b Pierpaolo$01750376 701 $aGuttman$b Joshua D$01750377 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484167003321 996 $aFormal aspects in security and trust$94185000 997 $aUNINA