Formal Aspects in Security and Trust [electronic resource] : Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y A Ryan, Steve Schneider.
Contributor(s): Dimitrakos, Theo [editor.] | Martinelli, Fabio [editor.] | Ryan, Peter Y A [editor.] | Schneider, Steve [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 4691Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007Edition: 1st ed. 2007.Description: VIII, 288 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540752271.Subject(s): Computer networks | Cryptography | Data encryption (Computer science) | Operating systems (Computers) | Computers and civilization | Electronic data processing -- Management | Information storage and retrieval systems | Computer Communication Networks | Cryptology | Operating Systems | Computers and Society | IT Operations | Information Storage and RetrievalAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 004.6 Online resources: Click here to access onlineStrategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks.
There are no comments for this item.