Amazon cover image
Image from Amazon.com

Formal aspects of security and trust : 8th International Workshop, FAST 2011, Leuven, Belgium, September 12-14, 2011. Revised selected papers / Gilles Barthe, Anupam Datta, Sandro Etalle (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 7140. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resource (x, 277 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642294204
  • 3642294200
Other title:
  • FAST 2011
Subject(s): Genre/Form: Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 F37 2011
Online resources:
Contents:
Verifying Cryptographic Code in C: Some Experience and the Csec Challenge / Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon and Jan Jürjens -- Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation / Willem De Groef, Dominique Devriese and Frank Piessens -- Differential Privacy: On the Trade-Off between Utility and Information Leakage / Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano and Catuscia Palamidessi -- On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow / Luciano Bello and Eduardo Bonelli -- Min-Entropy Leakage of Channels in Cascade / Barbara Espinoza and Geoffrey Smith -- Secure Recharge of Disposable RFID Tickets / Riccardo Focardi and Flaminia L. Luccio -- Avoiding Delegation Subterfuge Using Linked Local Permission Names / Simon N. Foley and Samane Abdi -- Verifiable Control Flow Policies for Java Bytecode / Arnaud Fontaine, Samuel Hym and Isabelle Simplot-Ryl -- Concepts and Proofs for Configuring PKCS#11 / Sibylle Fröschle and Nils Sommer -- Service Automata / Richard Gay, Heiko Mantel and Barbara Sprick -- Analysing Applications Layered on Unilaterally Authenticating Protocols / Thomas Gibson-Robinson and Gavin Lowe -- Type-Based Enforcement of Secure Programming Guidelines -- Code Injection Prevention at SAP / Robert Grabowski, Martin Hofmann and Keqin Li -- TBA : A Hybrid of Logic and Extensional Access Control Systems / Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders and John C. Mitchell -- Diffie-Hellman without Difficulty / Sebastian Mödersheim -- Is Cryptyc Able to Detect Insider Attacks? / Behnam Sattarzadeh and Mehran S. Fallah -- Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes / Ben Smyth, Mark Ryan and Liqun Chen -- Risk Balance in Optimistic Non-repudiation Protocols / Mohammad Torabi Dashti, Jan Cederquist and Yanjing Wang.
Summary: This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed trust management systems; trust-based reasoning; digital assets protection; data protection; privacy and ID issues; information flow analysis; language-based security; security and trust aspects of ubiquitous computing; validation/analysis tools; web service security/trust/privacy; grid security; security risk assessment; and case studies.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Verifying Cryptographic Code in C: Some Experience and the Csec Challenge / Mihhail Aizatulin, François Dupressoir, Andrew D. Gordon and Jan Jürjens -- Better Security and Privacy for Web Browsers: A Survey of Techniques, and a New Implementation / Willem De Groef, Dominique Devriese and Frank Piessens -- Differential Privacy: On the Trade-Off between Utility and Information Leakage / Mário S. Alvim, Miguel E. Andrés, Konstantinos Chatzikokolakis, Pierpaolo Degano and Catuscia Palamidessi -- On-the-Fly Inlining of Dynamic Dependency Monitors for Secure Information Flow / Luciano Bello and Eduardo Bonelli -- Min-Entropy Leakage of Channels in Cascade / Barbara Espinoza and Geoffrey Smith -- Secure Recharge of Disposable RFID Tickets / Riccardo Focardi and Flaminia L. Luccio -- Avoiding Delegation Subterfuge Using Linked Local Permission Names / Simon N. Foley and Samane Abdi -- Verifiable Control Flow Policies for Java Bytecode / Arnaud Fontaine, Samuel Hym and Isabelle Simplot-Ryl -- Concepts and Proofs for Configuring PKCS#11 / Sibylle Fröschle and Nils Sommer -- Service Automata / Richard Gay, Heiko Mantel and Barbara Sprick -- Analysing Applications Layered on Unilaterally Authenticating Protocols / Thomas Gibson-Robinson and Gavin Lowe -- Type-Based Enforcement of Secure Programming Guidelines -- Code Injection Prevention at SAP / Robert Grabowski, Martin Hofmann and Keqin Li -- TBA : A Hybrid of Logic and Extensional Access Control Systems / Timothy L. Hinrichs, William C. Garrison III, Adam J. Lee, Skip Saunders and John C. Mitchell -- Diffie-Hellman without Difficulty / Sebastian Mödersheim -- Is Cryptyc Able to Detect Insider Attacks? / Behnam Sattarzadeh and Mehran S. Fallah -- Formal Analysis of Anonymity in ECC-Based Direct Anonymous Attestation Schemes / Ben Smyth, Mark Ryan and Liqun Chen -- Risk Balance in Optimistic Non-repudiation Protocols / Mohammad Torabi Dashti, Jan Cederquist and Yanjing Wang.

Includes bibliographical references and author index.

Online resource; title from PDF title page (SpringerLink, viewed August 14, 2012).

This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed trust management systems; trust-based reasoning; digital assets protection; data protection; privacy and ID issues; information flow analysis; language-based security; security and trust aspects of ubiquitous computing; validation/analysis tools; web service security/trust/privacy; grid security; security risk assessment; and case studies.

Powered by Koha