Amazon cover image
Image from Amazon.com

Formal Aspects of Security [electronic resource] : First International Conference, FASec 2002, London, UK, December 16-18, 2002. Revised Papers / edited by Ali E. Abdallah, Peter Ryan, Steve Schneider.

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 2629Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003Description: X, 246 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540409816
Subject(s): Additional physical formats: Printed edition:: No titleDDC classification:
  • 005.82 23
LOC classification:
  • QA76.9.A25
Online resources:
Contents:
Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified URL Status Date due Barcode
IMSc Library Link to resource Available EBK4838

Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India