Cantitate/Preț
Produs

Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers: Lecture Notes in Computer Science, cartea 5983

Editat de Pierpaolo Degano, Joshua D. Guttman
en Limba Engleză Paperback – 20 apr 2010

Din seria Lecture Notes in Computer Science

Preț: 33322 lei

Preț vechi: 41652 lei
-20% Nou

Puncte Express: 500

Preț estimativ în valută:
6376 6675$ 5276£

Carte tipărită la comandă

Livrare economică 05-19 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642124587
ISBN-10: 3642124585
Pagini: 296
Ilustrații: X, 279 p. 46 illus.
Greutate: 0.44 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Invited Lecture.- Semantics and Enforcement of Expressive Information Flow Policies.- Session 1. Trust.- An Algebra for Trust Dilution and Trust Fusion.- HMM-Based Trust Model.- Deriving Trust from Experience.- Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties.- Session 2. Workflow and Orchestration.- Model Checking of Security-Sensitive Business Processes.- Session 3. Secure Flow.- Analysing the Information Flow Properties of Object-Capability Patterns.- Applied Quantitative Information Flow and Statistical Databases.- Specification and Verification of Side Channel Declassification.- Secure Information Flow for Distributed Systems.- Session 4. Mobility and Deniability.- Probable Innocence in the Presence of Independent Knowledge.- A Calculus of Trustworthy Ad Hoc Networks.- Session 5. Protocols 1.- Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties.- Game-Based Verification of Multi-Party Contract Signing Protocols.- Attack, Solution and Verification for Shared Authorisation Data in TCG TPM.- Session 6. Protocols 2.- Trusted Multiplexing of Cryptographic Protocols.- Specifying and Modelling Secure Channels in Strand Spaces.- Session 7. Protocols 3.- Integrating Automated and Interactive Protocol Verification.- A User Interface for a Game-Based Protocol Verification Tool.

Caracteristici

Up-to-date results Fast track conference proceedings State-of-the-art report