LEADER 04260nam 2200697Ia 450 001 9910484938903321 005 20200520144314.0 010 $a1-280-38325-9 010 $a9786613561176 010 $a3-642-03829-8 024 7 $a10.1007/978-3-642-03829-7 035 $a(CKB)1000000000772874 035 $a(SSID)ssj0000317774 035 $a(PQKBManifestationID)11208040 035 $a(PQKBTitleCode)TC0000317774 035 $a(PQKBWorkID)10308025 035 $a(PQKB)10784879 035 $a(DE-He213)978-3-642-03829-7 035 $a(MiAaPQ)EBC3064430 035 $a(PPN)13995113X 035 $a(EXLCZ)991000000000772874 100 $a20070824d2007 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFoundations of security analysis and design IV $eFOSAD 2006/2007 tutorial lectures /$fAlessandro Aldini, Roberto Gorrieri (eds.) 205 $a1st ed. 2009. 210 $aBerlin $cSpringer$dc2007 215 $a1 online resource (VIII, 339 p.) 225 1 $aLecture notes in computer science,$x0302-9743 ;$v4677.$aTutorial 300 $a"The 'International School on Foundations of Security Analysis and Design' (FOSAD) ... FOSAD is held annually at the Residential Centre of Bertinoro, Italy ... The present volume gathers a collection of tutorial lectures from FOSAD 2006 and FOSAD 2007"--Pref. 300 $aThe present FOSAD was held in September 2007. 311 $a3-642-03828-X 320 $aIncludes bibliographical references and index. 327 $aFoundations of Security Analysis and Design -- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties -- An Introduction to Certificate Translation -- Federated Identity Management -- Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment -- Logic in Access Control (Tutorial Notes) -- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols -- Verification of Concurrent Programs with Chalice -- Certified Static Analysis by Abstract Interpretation -- Resource Usage Analysis and Its Application to Resource Certification -- Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. 330 $aFOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security. 410 0$aLecture notes in computer science ;$v4677. 410 0$aLecture notes in computer science.$pTutorial. 517 3 $aFoundations of security analysis and design 4 517 3 $aFoundations of security analysis and design four 517 3 $aFOSAD 2006/2007 tutorial lectures 606 $aComputer security$vCongresses 606 $aComputer networks$xSecurity measures$vCongresses 615 0$aComputer security 615 0$aComputer networks$xSecurity measures 676 $a005.8 686 $aDAT 050f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 701 $aAldini$b Alessandro$0600344 701 $aGorrieri$b Roberto$0597785 712 12$aInternational School on Foundations of Security Analysis and Design$f(2007 :$eBertinoro, Italy) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484938903321 996 $aFoundations of security analysis and design IV$94193306 997 $aUNINA