LEADER 05549nam 22009015 450 001 996465299103316 005 20200702213434.0 010 $a1-280-38325-9 010 $a9786613561176 010 $a3-642-03829-8 024 7 $a10.1007/978-3-642-03829-7 035 $a(CKB)1000000000772874 035 $a(SSID)ssj0000317774 035 $a(PQKBManifestationID)11208040 035 $a(PQKBTitleCode)TC0000317774 035 $a(PQKBWorkID)10308025 035 $a(PQKB)10784879 035 $a(DE-He213)978-3-642-03829-7 035 $a(MiAaPQ)EBC3064430 035 $a(PPN)13995113X 035 $a(EXLCZ)991000000000772874 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFoundations of Security Analysis and Design V$b[electronic resource] $eFOSAD 2008/2009 Tutorial Lectures /$fedited by Alessandro Aldini, Gilles Barthe, Roberto Gorrieri 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (VIII, 339 p.) 225 1 $aSecurity and Cryptology ;$v5705 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-03828-X 327 $aFoundations of Security Analysis and Design -- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties -- An Introduction to Certificate Translation -- Federated Identity Management -- Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment -- Logic in Access Control (Tutorial Notes) -- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols -- Verification of Concurrent Programs with Chalice -- Certified Static Analysis by Abstract Interpretation -- Resource Usage Analysis and Its Application to Resource Certification -- Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks. 330 $aFOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security. 410 0$aSecurity and Cryptology ;$v5705 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aComputer logic 606 $aProgramming languages (Electronic computers) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aLogics and Meanings of Programs$3https://scigraph.springernature.com/ontologies/product-market-codes/I1603X 606 $aProgramming Languages, Compilers, Interpreters$3https://scigraph.springernature.com/ontologies/product-market-codes/I14037 608 $aAufsatzsammlung.$2swd 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer logic. 615 0$aProgramming languages (Electronic computers). 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aLogics and Meanings of Programs. 615 24$aProgramming Languages, Compilers, Interpreters. 676 $a005.8 686 $aDAT 050f$2stub 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aAldini$b Alessandro$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aBarthe$b Gilles$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGorrieri$b Roberto$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational School on Foundations of Security Analysis and Design$f(2007 :$eBertinoro, Italy) 712 12$aInternational School on Foundations of Security Analysis and Design$f(2008 :$eBertinoro, Italy) 712 12$aInternational School on Foundations of Security Analysis and Design$f(2009 :$eBertinoro, Italy) 906 $aBOOK 912 $a996465299103316 996 $aFoundations of Security Analysis and Design V$9773697 997 $aUNISA