LEADER 03030oam 2200601 450 001 996465947503316 005 20210611093805.0 010 $a3-540-75227-7 024 7 $a10.1007/978-3-540-75227-1 035 $a(CKB)1000000000490574 035 $a(SSID)ssj0000317693 035 $a(PQKBManifestationID)11248911 035 $a(PQKBTitleCode)TC0000317693 035 $a(PQKBWorkID)10293130 035 $a(PQKB)10745003 035 $a(DE-He213)978-3-540-75227-1 035 $a(MiAaPQ)EBC3063426 035 $a(MiAaPQ)EBC6451364 035 $a(PPN)123165369 035 $a(EXLCZ)991000000000490574 100 $a20210611d2007 uy 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 00$aFormal aspects in security and trust $eFourth international workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006 : revised selected papers /$fTheo Dimitrakos [and three others] (editors) 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer,$d[2007] 210 4$d©2007 215 $a1 online resource (VIII, 288 p.) 225 1 $aLecture Notes in Computer Science ;$v4691 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-75226-9 320 $aIncludes bibliographical references and index. 327 $aStrategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. 410 0$aLecture notes in computer science ;$v4691. 606 $aComputer security$vCongresses 606 $aFormal methods (Computer science)$vCongresses 606 $aTrust$vCongresses 615 0$aComputer security 615 0$aFormal methods (Computer science) 615 0$aTrust 676 $a005.8 702 $aDimitrakos$b Theo 712 12$aFAST 2006 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bUtOrBLW 906 $aBOOK 912 $a996465947503316 996 $aFormal Aspects in Security and Trust$9772285 997 $aUNISA