Formal Aspects of Security

Formal Aspects of Security
-0 %
First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers
 Paperback
Print on Demand | Lieferzeit: Print on Demand - Lieferbar innerhalb von 3-5 Werktagen I

Unser bisheriger Preis:ORGPRICE: 53,49 €

Jetzt 53,48 €* Paperback

Alle Preise inkl. MwSt. | Versandkostenfrei
Artikel-Nr:
9783540206934
Veröffentl:
2003
Einband:
Paperback
Erscheinungsdatum:
03.12.2003
Seiten:
256
Autor:
Ali E. Abdallah
Gewicht:
394 g
Format:
235x155x15 mm
Serie:
2629, Lecture Notes in Computer Science
Sprache:
Englisch
Beschreibung:

Preface Formal Aspects of Security (FASec) was held at Royal Holloway, University of London, 18 20 December 2002. The occasion celebrated a Jubilee, namely the 25thanniversaryoftheestablishmentofBCS-FACS,theFormalAspectsofC- puting Science specialist group of the British Computer Society. FASec is one of a series of events organized by BCS-FACS to highlight the use of formal me- ods, emphasize their relevance to modern computing, and promote their wider application. As the architecture model of information systems evolves from - connected PCs,throughintranet (LAN) and internet (WAN), to mobile internet and grids, security becomes increasingly critical to all walks of society: c- merce, ?nance, health, transport, defence and science. It is no surprise therefore that security is one of the fastest-growing research areas in computer science. Theaudience ofFASec includes thosein the formalmethods community who have(orwouldliketodevelop)adeeper interestinsecurity,andthoseinsecurity who would like to understand how formal methods can make important cont- butions to some aspects of security. The scope of FASec is deliberately broad andcoverstopics that rangefrommodelling securityrequirementsthroughsp- i?cation, analysis, and veri?cations of cryptographic protocols to certi?ed code. The discussions at FASec 2002 encompassed many aspects of security: from theoretical foundations through support tools and on to applications. Formal methods has made a substantial contribution to this exciting ?eld in the past.
Includes supplementary material: sn.pub/extras
Keynote Talk.- Lifting Reference Monitors from the Kernel.- Invited Talks I.- Authenticity Types for Cryptographic Protocols.- Verifying the SET Protocol: Overview.- Protocol Verification.- Interacting State Machines: A Stateful Approach to Proving Security.- Automatic Approximation for the Verification of Cryptographic Protocols.- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.- Invited Talks II.- Critical Critical Systems.- Analysing Security Protocols.- Analysis of Protocols.- Analysis of Probabilistic Contract Signing.- Security Analysis of (Un-) Fair Non-repudiation Protocols.- Modeling Adversaries in a Logic for Security Protocol Analysis.- Security Modelling and Reasonning.- Secure Self-certified Code for Java.- Z Styles for Security Properties and Modern User Interfaces.- Invited Talks III.- Cryptographic Challenges: The Past and the Future.- TAPS: The Last Few Slides.- Intrusion Detection Systems and Liveness.- Formal Specification for Fast Automatic IDS Training.- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area.- Revisiting Liveness Properties in the Context of Secure Systems.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.