LEADER 05460nam 22008055 450 001 996466037203316 005 20200702035007.0 010 $a3-642-01465-8 024 7 $a10.1007/978-3-642-01465-9 035 $a(CKB)1000000000718121 035 $a(SSID)ssj0000317694 035 $a(PQKBManifestationID)11246701 035 $a(PQKBTitleCode)TC0000317694 035 $a(PQKBWorkID)10293509 035 $a(PQKB)10637417 035 $a(DE-He213)978-3-642-01465-9 035 $a(MiAaPQ)EBC3064114 035 $a(PPN)134131509 035 $a(EXLCZ)991000000000718121 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFormal Aspects in Security and Trust$b[electronic resource] $e5th International Workshop, FAST 2008 Malaga, Spain, October 9-10, 2008, Revised Selected Papers /$fedited by Pierpaolo Degano, Joshua D. Guttman, Fabio Martinelli 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 331 p.) 225 1 $aSecurity and Cryptology ;$v5491 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-01464-X 320 $aIncludes bibliographical references and index. 327 $aFormal Certification of ElGamal Encryption -- Secure Information Flow as a Safety Property -- Who Can Declassify? -- Non-Interference for Deterministic Interactive Programs -- Information-Theoretic Modeling and Analysis of Interrupt-Related Covert Channels -- Causality and Accountability -- Dynamics, Robustness and Fragility of Trust -- Trust within the Context of Organizations: A Formal Approach -- Know What You Trust -- Privacy-Friendly Electronic Traffic Pricing via Commits -- A Formal Privacy Management Framework -- Parameterised Anonymity -- Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder -- Petri Net Security Checker: Structural Non-interference at Work -- Verifying Multi-party Authentication Using Rank Functions and PVS -- The Append-Only Web Bulletin Board -- Secure Broadcast Ambients -- Extending Anticipation Games with Location, Penalty and Timeline -- Do You Really Mean What You Actually Enforced? -- Delegating Privileges over Finite Resources: A Quota Based Delegation Approach -- Access Control and Information Flow in Transactional Memory. 330 $aThis book constitutes the thoroughly refereed post-workshop proceedings of the 5th International Workshop on Formal Aspects in Security and Trust, FAST 2008, held under the auspices of IFIP WG 1.7 in Malaga, Spain, in October 2008 as a satellite event of 13th European Symposium on Research in Computer Security. The 20 revised papers presented were carefully reviewed and selected from 59 submissions. The papers focus of formal aspects in security, trust and reputation, security protocol design and analysis, logics for security and trust, trust-based reasoning, distributed trust management systems, digital asset protection, data protection, privacy and id management issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, Web/grid services security/trust/privacy, security and risk assessment, resource and access control, as well as case studies. 410 0$aSecurity and Cryptology ;$v5491 606 $aComputer security 606 $aComputer communication systems 606 $aData encryption (Computer science) 606 $aComputers and civilization 606 $aManagement information systems 606 $aComputer science 606 $aInformation storage and retrieval 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputers and Society$3https://scigraph.springernature.com/ontologies/product-market-codes/I24040 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aInformation Storage and Retrieval$3https://scigraph.springernature.com/ontologies/product-market-codes/I18032 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aData encryption (Computer science). 615 0$aComputers and civilization. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aInformation storage and retrieval. 615 14$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aCryptology. 615 24$aComputers and Society. 615 24$aManagement of Computing and Information Systems. 615 24$aInformation Storage and Retrieval. 676 $a005.8 702 $aDegano$b Pierpaolo$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aGuttman$b Joshua D$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMartinelli$b Fabio$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996466037203316 996 $aFormal Aspects in Security and Trust$9772285 997 $aUNISA