LEADER 01602nam a22003253i 4500 001 991003681399707536 005 20030916124816.0 008 031111s1995 it |||||||||||||||||ita 020 $a8872844150 035 $ab12460254-39ule_inst 035 $aARCHE-049354$9ExL 040 $aDip.to Lingue$bita$cA.t.i. Arché s.c.r.l. Pandora Sicilia s.r.l. 082 04$a840 245 00$aMedioevo romanzo e orientale: oralità, scrittura, modelli narrativi :$bII colloquio internazionale, Napoli, 17-19 febbraio 1994 : atti /$ca cura di Antonio Pioletti e Francesca Rizzo Nervo ; indici a cura di Giovanna Carbonaro e Carmela Licari 260 $aSoveria Mannelli [etc.] :$bRubbettino,$c1995 300 $aX, 330 p. ;$c24 cm 440 0$aMedioevo romanzo e orientale.$pColloqui ;$v2 500 $aIn appendice: Progetti di un lessico di Romano il Melode, di Riccardo Maisano 650 4$aLetterature neolatine$ySec. 9.-15.$xCongressi$y1994 650 4$aLetteratura bizantina$ySec. 9.-15.$xCongressi$y1994 700 1 $aPioletti, Antonio 700 1 $aRizzo Nervo, Francesca 700 1 $aMaisano, Riccardo 907 $a.b12460254$b20-06-14$c13-11-03 912 $a991003681399707536 945 $aLE012 447 PIO$g1$i2012000198593$lle012$o-$pE0.00$q-$rl$s- $t0$u1$v0$w1$x0$y.i1289008x$z13-11-03 945 $aLE007 840 MED 01.01$g1$i2015000126658$lle007$nLE007 2014 CC$o-$pE0.00$q-$rl$s- $t0$u0$v0$w0$x0$y.i11392605$z01-07-02 996 $aMedioevo romanzo e orientale: oralità, scrittura, modelli narrativi$9179348 997 $aUNISALENTO 998 $ale012$b13-11-03$cm$da $e-$fita$git $h0$i1 LEADER 04493nam 22008775 450 001 9910484812903321 005 20251226200121.0 010 $a3-540-75227-7 024 7 $a10.1007/978-3-540-75227-1 035 $a(CKB)1000000000490574 035 $a(SSID)ssj0000317693 035 $a(PQKBManifestationID)11248911 035 $a(PQKBTitleCode)TC0000317693 035 $a(PQKBWorkID)10293130 035 $a(PQKB)10745003 035 $a(DE-He213)978-3-540-75227-1 035 $a(MiAaPQ)EBC3063426 035 $a(MiAaPQ)EBC6451364 035 $a(PPN)123165369 035 $a(MiAaPQ)EBC336935 035 $a(BIP)32373962 035 $a(BIP)14495534 035 $a(EXLCZ)991000000000490574 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFormal Aspects in Security and Trust $eFourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers /$fedited by Theo Dimitrakos, Fabio Martinelli, Peter Y A Ryan, Steve Schneider 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (VIII, 288 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4691 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-540-75226-9 320 $aIncludes bibliographical references and index. 327 $aStrategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. 330 $aThis book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006. The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers include focus of formal aspects in security and trust policy models, security protocol design and analysis, and formal models of trust and reputation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4691 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aComputers and civilization 606 $aElectronic data processing$xManagement 606 $aInformation storage and retrieval systems 606 $aComputer Communication Networks 606 $aCryptology 606 $aOperating Systems 606 $aComputers and Society 606 $aIT Operations 606 $aInformation Storage and Retrieval 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aOperating systems (Computers). 615 0$aComputers and civilization. 615 0$aElectronic data processing$xManagement. 615 0$aInformation storage and retrieval systems. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aOperating Systems. 615 24$aComputers and Society. 615 24$aIT Operations. 615 24$aInformation Storage and Retrieval. 676 $a005.8 702 $aDimitrakos$b Theo 712 12$aFAST 2006 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484812903321 996 $aFormal Aspects in Security and Trust$9772285 997 $aUNINA