1 option
Foundations of Security Analysis and Design II : FOSAD 2001/2002 Tutorial Lectures / edited by Riccardo Focardi, Roberto Gorrieri.
LIBRA Q341 .P7 2004
Available from offsite location
- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- Lecture notes in computer science 0302-9743 ; 2946.
- Lecture Notes in Computer Science, 0302-9743 ; 2946
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Computer networks.
- Operating systems (Computers).
- Programming languages (Electronic computers).
- Computer logic.
- Management information systems.
- Computer science.
- Cryptology.
- Computer Communication Networks.
- Operating Systems.
- Programming Languages, Compilers, Interpreters.
- Logics and Meanings of Programs.
- Management of Computing and Information Systems.
- Local Subjects:
- Cryptology.
- Computer Communication Networks.
- Operating Systems.
- Programming Languages, Compilers, Interpreters.
- Logics and Meanings of Programs.
- Management of Computing and Information Systems.
- Physical Description:
- 1 online resource (VIII, 272 pages).
- Edition:
- First edition 2004.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
- System Details:
- text file PDF
- Summary:
- Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, et cetera Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness. This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro, Italy, in September 2001 and September 2002. The lectures are devoted to: - Formal Approaches to Approximating Noninterference Properties - The Key Establishment Problem - Name-Passing Calculi and Cryptoprimitives - Classification of Security Properties; Network Security - Cryptographic Algorithms for Multimedia Traffic - Security for Mobility.
- Contents:
- Two Formal Approaches for Approximating Noninterference Properties
- The Key Establishment Problem
- A Survey of Name-Passing Calculi and Crypto-Primitives
- Classification of Security Properties
- Cryptographic Algorithms for Multimedia Traffic
- Security for Mobility.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-24631-2
- 9783540246312
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.