000 03868nam a22006255i 4500
001 978-3-642-12459-4
003 DE-He213
005 20240730191105.0
007 cr nn 008mamaa
008 100429s2010 gw | s |||| 0|eng d
020 _a9783642124594
_9978-3-642-12459-4
024 7 _a10.1007/978-3-642-12459-4
_2doi
050 4 _aTK5105.5-5105.9
072 7 _aUKN
_2bicssc
072 7 _aCOM043000
_2bisacsh
072 7 _aUKN
_2thema
082 0 4 _a004.6
_223
245 1 0 _aFormal Aspects in Security and Trust
_h[electronic resource] :
_b6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers /
_cedited by Pierpaolo Degano, Joshua D. Guttman.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aX, 279 p. 46 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5983
505 0 _aInvited Lecture -- Semantics and Enforcement of Expressive Information Flow Policies -- Session 1. Trust -- An Algebra for Trust Dilution and Trust Fusion -- HMM-Based Trust Model -- Deriving Trust from Experience -- Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties -- Session 2. Workflow and Orchestration -- Model Checking of Security-Sensitive Business Processes -- Session 3. Secure Flow -- Analysing the Information Flow Properties of Object-Capability Patterns -- Applied Quantitative Information Flow and Statistical Databases -- Specification and Verification of Side Channel Declassification -- Secure Information Flow for Distributed Systems -- Session 4. Mobility and Deniability -- Probable Innocence in the Presence of Independent Knowledge -- A Calculus of Trustworthy Ad Hoc Networks -- Session 5. Protocols 1 -- Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties -- Game-Based Verification of Multi-Party Contract Signing Protocols -- Attack, Solution and Verification for Shared Authorisation Data in TCG TPM -- Session 6. Protocols 2 -- Trusted Multiplexing of Cryptographic Protocols -- Specifying and Modelling Secure Channels in Strand Spaces -- Session 7. Protocols 3 -- Integrating Automated and Interactive Protocol Verification -- A User Interface for a Game-Based Protocol Verification Tool.
650 0 _aComputer networks .
_931572
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aData protection.
_97245
650 0 _aComputers and civilization.
_921733
650 0 _aElectronic data processing
_xManagement.
_9145134
650 0 _aInformation storage and retrieval systems.
_922213
650 1 4 _aComputer Communication Networks.
_9145135
650 2 4 _aCryptology.
_931769
650 2 4 _aData and Information Security.
_931990
650 2 4 _aComputers and Society.
_931668
650 2 4 _aIT Operations.
_931703
650 2 4 _aInformation Storage and Retrieval.
_923927
700 1 _aDegano, Pierpaolo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145136
700 1 _aGuttman, Joshua D.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9145137
710 2 _aSpringerLink (Online service)
_9145138
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642124587
776 0 8 _iPrinted edition:
_z9783642124600
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5983
_9145139
856 4 0 _uhttps://doi.org/10.1007/978-3-642-12459-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c93613
_d93613