, ,

Formal Aspects of Security

First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers

Specificaties
Paperback, 246 blz. | Engels
Springer Berlin Heidelberg | 2003e druk, 2003
ISBN13: 9783540206934
Rubricering
Juridisch :
Springer Berlin Heidelberg 2003e druk, 2003 9783540206934
Onderdeel van serie Lecture Notes in Computer Science
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

Preface Formal Aspects of Security (FASec) was held at Royal Holloway, University of London, 18–20 December 2002. The occasion celebrated a Jubilee, namely the 25thanniversaryoftheestablishmentofBCS-FACS,theFormalAspectsofC- puting Science specialist group of the British Computer Society. FASec is one of a series of events organized by BCS-FACS to highlight the use of formal me- ods, emphasize their relevance to modern computing, and promote their wider application. As the architecture model of information systems evolves from - connected PCs,throughintranet (LAN) and internet (WAN), to mobile internet and grids, security becomes increasingly critical to all walks of society: c- merce, ?nance, health, transport, defence and science. It is no surprise therefore that security is one of the fastest-growing research areas in computer science. Theaudience ofFASec includes thosein the formalmethods community who have(orwouldliketodevelop)adeeper interestinsecurity,andthoseinsecurity who would like to understand how formal methods can make important cont- butions to some aspects of security. The scope of FASec is deliberately broad andcoverstopics that rangefrommodelling securityrequirementsthroughsp- i?cation, analysis, and veri?cations of cryptographic protocols to certi?ed code. The discussions at FASec 2002 encompassed many aspects of security: from theoretical foundations through support tools and on to applications. Formal methods has made a substantial contribution to this exciting ?eld in the past.

Specificaties

ISBN13:9783540206934
Taal:Engels
Bindwijze:paperback
Aantal pagina's:246
Uitgever:Springer Berlin Heidelberg
Druk:2003

Inhoudsopgave

Keynote Talk.- Lifting Reference Monitors from the Kernel.- Invited Talks I.- Authenticity Types for Cryptographic Protocols.- Verifying the SET Protocol: Overview.- Protocol Verification.- Interacting State Machines: A Stateful Approach to Proving Security.- Automatic Approximation for the Verification of Cryptographic Protocols.- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.- Invited Talks II.- Critical Critical Systems.- Analysing Security Protocols.- Analysis of Protocols.- Analysis of Probabilistic Contract Signing.- Security Analysis of (Un-) Fair Non-repudiation Protocols.- Modeling Adversaries in a Logic for Security Protocol Analysis.- Security Modelling and Reasonning.- Secure Self-certified Code for Java.- Z Styles for Security Properties and Modern User Interfaces.- Invited Talks III.- Cryptographic Challenges: The Past and the Future.- TAPS: The Last Few Slides.- Intrusion Detection Systems and Liveness.- Formal Specification for Fast Automatic IDS Training.- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area.- Revisiting Liveness Properties in the Context of Secure Systems.

Net verschenen

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Formal Aspects of Security