Foundations of security analysis and design V : FOSAD 2007/2008/2009 tutorial lectures / Alessandro Aldini, Gilles Barthe, Roberto Gorrieri (eds.).

Contributor(s): Aldini, Alessandro | Barthe, Gilles, 1967- | Gorreri, Roberto | International School on Foundations of Security Analysis and Design (2007 : Bertinoro, Italy) | International School on Foundations of Security Analysis and Design (2008 : Bertinoro, Italy) | International School on Foundations of Security Analysis and Design (2009 : Bertinoro, Italy)
Material type: TextTextSeries: SerienbezeichnungLecture notes in computer science: 5705.; Tutorial: Publisher: Berlin : Springer, ©2009Description: 1 online resource (viii, 338 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783642038297; 3642038298Subject(s): Computer networks -- Security measures -- Congresses | Computer security -- Congresses | Computer Security | Computer Communication Networks | Computer security | Computer networks -- Security measures | Informatique | Computer networks -- Security measures | Computer security | Computersicherheit | Datensicherung | Kryptologie | KryptosystemGenre/Form: Congress | Electronic books. | Conference papers and proceedings. Additional physical formats: Print version:: Foundations of security analysis and design V.DDC classification: 005.8 LOC classification: QA76.9.A25 | I5564 2009Other classification: 54.32 | 54.62 | TP393. 08-532 | TP309-532 | SS 4800 | DAT 465f | DAT 050f Online resources: Click here to access online
Contents:
Foundations of Security Analysis and Design -- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties -- An Introduction to Certificate Translation -- Federated Identity Management -- Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment -- Logic in Access Control (Tutorial Notes) -- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols -- Verification of Concurrent Programs with Chalice -- Certified Static Analysis by Abstract Interpretation -- Resource Usage Analysis and Its Application to Resource Certification -- Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.
Summary: FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.

Foundations of Security Analysis and Design -- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties -- An Introduction to Certificate Translation -- Federated Identity Management -- Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment -- Logic in Access Control (Tutorial Notes) -- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols -- Verification of Concurrent Programs with Chalice -- Certified Static Analysis by Abstract Interpretation -- Resource Usage Analysis and Its Application to Resource Certification -- Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks.

There are no comments for this item.

to post a comment.

Powered by Koha