1 option
Formal Aspects of Security and Trust : 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers / edited by Pierpaolo Degano, Sandro Etalle, Joshua Guttman.
- Format:
- Book
- Series:
- Computer Science (SpringerNature-11645)
- LNCS sublibrary. Security and cryptology ; SL 4, 6561
- Security and Cryptology ; 6561
- Language:
- English
- Subjects (All):
- Computer networks.
- Cryptography.
- Data encryption (Computer science).
- Data protection.
- Computers and civilization.
- Electronic data processing-Management.
- Information storage and retrieval systems.
- Computer Communication Networks.
- Cryptology.
- Data and Information Security.
- Computers and Society.
- IT Operations.
- Information Storage and Retrieval.
- Local Subjects:
- Computer Communication Networks.
- Cryptology.
- Data and Information Security.
- Computers and Society.
- IT Operations.
- Information Storage and Retrieval.
- Physical Description:
- 1 online resource (X, 239 pages)
- Edition:
- 1st ed. 2011.
- Contained In:
- Springer Nature eBook
- Place of Publication:
- Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2011.
- System Details:
- text file PDF
- Summary:
- This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.
- Other Format:
- Printed edition:
- ISBN:
- 978-3-642-19751-2
- 9783642197512
- Access Restriction:
- Restricted for use by site license.
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.