<p>FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical
Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures
β Scribed by Sabrina De Capitani di Vimercati, Sara Foresti, Giovanni Livraga, Pierangela Samarati (auth.), Alessandro Aldini, Roberto Gorrieri (eds.)
- Publisher
- Springer-Verlag Berlin Heidelberg
- Year
- 2011
- Tongue
- English
- Leaves
- 282
- Series
- Lecture Notes in Computer Science 6858 Tutorial
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.
β¦ Table of Contents
Front Matter....Pages -
Protecting Privacy in Data Release....Pages 1-34
An Introduction to Security API Analysis....Pages 35-65
Cryptographic Verification by Typing for a Sample Protocol Implementation....Pages 66-100
Model-Driven Development of Security-Aware GUIs for Data-Centric Applications....Pages 101-124
On Intransitive Non-interference in Some Models of Concurrency....Pages 125-151
A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach....Pages 152-184
The Geometry of Lattice Cryptography....Pages 185-210
Quantitative Information Flow and Applications to Differential Privacy....Pages 211-230
Risk Analysis of Changing and Evolving Systems Using CORAS....Pages 231-274
Back Matter....Pages -
β¦ Subjects
Systems and Data Security; Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Logics and Meanings of Programs; Programming Languages, Compilers, Interpreters
π SIMILAR VOLUMES
<p><P>Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such app
<P>The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of research groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security as
<p>The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security as
<P>The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of research groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security as
<p><P>Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such app