Theory of security and applications : joint workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011 : revised selected papers / Sebastian Mödersheim, Catuscia Palamidessi (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 6993. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin ; New York : Springer, ©2012.Description: 1 online resource (vi, 224 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783642273759
- 3642273750
- TOSCA 2011
- Computer security -- Congresses
- Data encryption (Computer science) -- Congresses
- Computer networks -- Security measures -- Congresses
- Sécurité informatique -- Congrès
- Chiffrement (Informatique) -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Informatique
- Computer networks -- Security measures
- Computer security
- Data encryption (Computer science)
- Computer science
- Computer Communication Networks
- Software engineering
- Data encryption (Computer science)
- Computer software
- Computers and Society
- Algorithm Analysis and Problem Complexity
- Programming Languages, Compilers, Interpreters
- 005.8 23
- QA76.9.A25 J65 2012
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Includes bibliographical references and author index.
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrucken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application.
English.