Foundations of security analysis and design VI : FOSAD tutorial lectures / Alessandro Aldini, Roberto Gorrieri (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 6858. | Lecture notes in computer science. Tutorial. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin : Springer, ©2011.Description: 1 online resource (vi, 274 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783642230820
- 3642230822
- 9783642230813
- 3642230814
- FOSAD tutorial lectures
- FOSAD 2010
- Foundations of security analysis and design 6
- Foundations of security analysis and design six
- Computer networks -- Security measures -- Congresses
- Computer security -- Congresses
- Data protection
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Sécurité informatique -- Congrès
- Protection de l'information (Informatique)
- Informatique
- Computer networks -- Security measures
- Computer security
- Data protection
- 005.8 23
- TK5105.59 .F68 2011
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and author index.
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.