|
|
|||
|
||||
OverviewThis book constitutes the thoroughly refereed post-proceedings of the Fourth International Workshop on Formal Aspects in Security and Trust, FAST 2006, held in Hamilton, Ontario, Canada, August 26-27, 2006. The 18 revised papers presented were carefully reviewed and selected from 47 submissions. The papers include focus of formal aspects in security and trust policy models, security protocol design and analysis, and formal models of trust and reputation. Full Product DetailsAuthor: Theo Dimitrakos , Fabio Martinelli , Peter Y A Ryan , Steve SchneiderPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2007 ed. Volume: 4691 Dimensions: Width: 15.50cm , Height: 1.50cm , Length: 23.50cm Weight: 0.457kg ISBN: 9783540752264ISBN 10: 3540752269 Pages: 288 Publication Date: 17 September 2007 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsStrategic Games on Defense Trees.- Timed Calculus of Cryptographic Communication.- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk.- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security.- Measuring Anonymity with Relative Entropy.- Formalizing and Analyzing Sender Invariance.- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust.- A Tool for the Synthesis of Controller Programs.- Where Can an Insider Attack?.- Maintaining Information Flow Security Under Refinement and Transformation.- A Classification of Delegation Schemes for Attribute Authority.- Program Partitioning Using Dynamic Trust Models.- Locality-Based Security Policies.- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols.- A Formal Specification of the MIDP 2.0 Security Model.- A Comparison of Semantic Models for Noninterference.- Hiding Information in Multi Level Security Systems.- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |