Muutke küpsiste eelistusi

Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010, Revised Selected Papers [Pehme köide]

Edited by , Edited by
  • Formaat: Paperback / softback, 185 pages, 39 Illustrations, black and white; IX, 185 p. 39 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 6186
  • Ilmumisaeg: 08-Oct-2010
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642160735
  • ISBN-13: 9783642160738
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 185 pages, 39 Illustrations, black and white; IX, 185 p. 39 illus., 1 Paperback / softback
  • Sari: Security and Cryptology 6186
  • Ilmumisaeg: 08-Oct-2010
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3642160735
  • ISBN-13: 9783642160738
ThisvolumecontainstheworkshopproceedingsofARSPA-WITS2010,theJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, held during March 27-28, 2010 in Paphos (Cyprus). ARSPA-WITS2010o eredaforumfordiscussingnewresultsintheoriesofc- putersecurity,openquestionsandfundamentalconcernsaboutexistingtheories, and issues related to the development and application of automated reas- ing techniques and tools for the formal speci cation and analysis of security protocols. There were 28 submissions. All the submissions were thoroughly evaluated on the basis of at least three referee reports, and an electronic Program C- mittee meeting was held by using the EasyChair on-line conference system. The committee decided to accept the 11 papers included in this volume. The authors were giventhe opportunity to revise their paper in light of the feedback received during the workshop. The workshop program was enriched by two invited talks by Flemming Nielson and Catuscia Palamidessi, whose titles and abstracts are also included in this volume. April 2010 Alessandro Armando Gavin Lowe Conference Organization Program Chairs Alessandro Armando Universita di Genova, Italy (Co-chair) Gavin Lowe Oxford University, UK (Co-chair) Program Committee Lujo Bauer CMU, USA Yannick Chevalier Universite Toulouse III, France Luca Compagna SAP Research, France Cas Cremers ETHZ, Switzerland Jorge Cuellar Siemens, Germany Pierpaolo Degano Universita di Pisa, Italy Sandro Etalle Technical University of Eindhoven and University of Twente, The Netherlands Riccardo Focardi Universita di Venezia, Italy Dieter Gollman Technische Universitat Hamburg-Harburg, Germany Joshua Guttman MITRE, USA Jan Jurjens TU Dortmund and Fraunhofer ISST, Germany Gavin Lowe Oxford University, UK (Co-chair) Catherine Meadows Naval Research Laboratory, USA John Mitchell Stanford University, USA
The CaPiTo Approach to Protocol Validation (Invited Talk)
1(1)
Flemming Nielson
Han Gao
Hanne Riis Nielson
Reasoning about Probabilistic Security Using Task-PIOAs
2(21)
Aaron D. Jaggard
Catherine Meadows
Michael Mislove
Roberto Segala
Secrecy and Authenticity Types for Secure Distributed Messaging
23(18)
Michele Bugliesi
Stefano Calzavara
Damiano Macedonio
Modular Plans for Secure Service Composition
41(18)
Gabriele Costa
Pierpaolo Degano
Fabio Martinelli
A Type System for Access Control Views in Object-Oriented Languages
59(18)
Mario Pires
Luis Caires
Formal Analysis of Key Integrity in PKCS#11
77(18)
Andrea Falcone
Riccardo Focardi
Secure Upgrade of Hardware Security Modules in Bank Networks
95(16)
Riccardo Focardi
Flaminia L. Luccio
Interactive Information Flow (Invited Talk)
111(1)
Catuscia Palamidessi
Mario S. Alvim
Miguel E. Andres
Portunes: Representing Attack Scenarios Spanning through the Physical, Digital and Social Domain
112(18)
Trajce Dimkov
Walter Pieters
Pieter Hartel
Match It or Die: Proving Integrity by Equality
130(16)
Matteo Centenaro
Riccardo Focardi
Towards Automatic Analysis of Election Verifiability Properties
146(18)
Ben Smyth
Mark Ryan
Steve Kremer
Mounira Kourjieh
AnBx - Security Protocols Design and Verification
164(21)
Michele Bugliesi
Paolo Modesti
Author Index 185