1 option
Formal Aspects in Security and Trust : Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers / edited by Theo Dimitrakos, Fabio Martinelli, Peter Y A Ryan, Steve Schneider.
SpringerLink Books Lecture Notes In Computer Science (LNCS) (1997-2024) Available online
View online- Format:
- Book
- Series:
- Computer Science (Springer-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 4691.
- Security and Cryptology ; 4691
- Language:
- English
- Subjects (All):
- Computer networks.
- Data encryption (Computer science).
- Operating systems (Computers).
- Computers and civilization.
- Management information systems.
- Computer science.
- Information storage and retrieval.
- Computer Communication Networks.
- Cryptology.
- Operating Systems.
- Computers and Society.
- Management of Computing and Information Systems.
- Information Storage and Retrieval.
- Local Subjects:
- Computer Communication Networks.
- Cryptology.
- Operating Systems.
- Computers and Society.
- Management of Computing and Information Systems.
- Information Storage and Retrieval.
- Physical Description:
- 1 online resource (VIII, 288 pages).
- Edition:
- First edition 2007.
- Contained In:
- Springer eBooks
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
- System Details:
- text file PDF
- Contents:
- Strategic Games on Defense Trees
- Timed Calculus of Cryptographic Communication
- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk
- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security
- Measuring Anonymity with Relative Entropy
- Formalizing and Analyzing Sender Invariance
- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust
- A Tool for the Synthesis of Controller Programs
- Where Can an Insider Attack?
- Maintaining Information Flow Security Under Refinement and Transformation
- A Classification of Delegation Schemes for Attribute Authority
- Program Partitioning Using Dynamic Trust Models
- Locality-Based Security Policies
- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols
- A Formal Specification of the MIDP 2.0 Security Model
- A Comparison of Semantic Models for Noninterference
- Hiding Information in Multi Level Security Systems
- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-540-75227-1
- 9783540752271
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.