<p><p>This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers
β Scribed by Dusko Pavlovic (auth.), Pierpaolo Degano, Sandro Etalle, Joshua Guttman (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2011
- Tongue
- English
- Leaves
- 251
- Series
- Lecture Notes in Computer Science 6561
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.
β¦ Table of Contents
Front Matter....Pages -
Quantifying and Qualifying Trust: Spectral Decomposition of Trust Networks....Pages 1-17
Bounded Memory Dolev-Yao Adversaries in Collaborative Systems....Pages 18-33
Efficient Decision Procedures for Message Deducibility and Static Equivalence....Pages 34-49
Understanding Abstractions of Secure Channels....Pages 50-64
Information Flow Analysis via Path Condition Refinement....Pages 65-79
Foundations of AttackβDefense Trees....Pages 80-95
Reasoning with Past to Prove PKCS#11 Keys Secure....Pages 96-110
A Formal Analysis of Authentication in the TPM....Pages 111-125
Modeling Identity-Related Properties and Their Privacy Strength....Pages 126-140
Semantics of Trust....Pages 141-156
Semi-automatic Synthesis of Security Policies by Invariant-Guided Abduction....Pages 157-175
Corrective Enforcement of Security Policies....Pages 176-190
Cryptographic Enforcement of Role-Based Access Control....Pages 191-205
A Calculus for the Analysis of Wireless Network Security Protocols....Pages 206-222
Analysis of a Receipt-Free Auction Protocol in the Applied Pi Calculus....Pages 223-238
Back Matter....Pages -
β¦ Subjects
Computer Communication Networks; Data Encryption; Systems and Data Security; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval
π SIMILAR VOLUMES
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 rev
<p>This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Security and Trust Management, STM 2012, held in Pisa, Italy, in September 2012 - in conjunction with the 17th European Symposium Research in Computer Security (ESORICS 2012). The 20 rev
<p>This book constitutes the thoroughly refereed joint post proceedings of two international workshops, the 7th International Workshop on Data Privacy Management, DPM 2012, and the 5th International Workshop on Autonomous and Spontaneous Security, SETOP 2012, held in Pisa, Italy, in September 2012.