LEADER 03515nam a22005655i 4500
001 978-3-642-12459-4
003 DE-He213
005 20151204163606.0
007 cr nn 008mamaa
008 100429s2010 gw | s |||| 0|eng d
020 |a 9783642124594  |9 978-3-642-12459-4 
024 7 |a 10.1007/978-3-642-12459-4  |2 doi 
040 |d GrThAP 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Formal Aspects in Security and Trust  |h [electronic resource] :  |b 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers /  |c edited by Pierpaolo Degano, Joshua D. Guttman. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2010. 
300 |a X, 279 p. 46 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 5983 
505 0 |a Invited Lecture -- Semantics and Enforcement of Expressive Information Flow Policies -- Session 1. Trust -- An Algebra for Trust Dilution and Trust Fusion -- HMM-Based Trust Model -- Deriving Trust from Experience -- Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties -- Session 2. Workflow and Orchestration -- Model Checking of Security-Sensitive Business Processes -- Session 3. Secure Flow -- Analysing the Information Flow Properties of Object-Capability Patterns -- Applied Quantitative Information Flow and Statistical Databases -- Specification and Verification of Side Channel Declassification -- Secure Information Flow for Distributed Systems -- Session 4. Mobility and Deniability -- Probable Innocence in the Presence of Independent Knowledge -- A Calculus of Trustworthy Ad Hoc Networks -- Session 5. Protocols 1 -- Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties -- Game-Based Verification of Multi-Party Contract Signing Protocols -- Attack, Solution and Verification for Shared Authorisation Data in TCG TPM -- Session 6. Protocols 2 -- Trusted Multiplexing of Cryptographic Protocols -- Specifying and Modelling Secure Channels in Strand Spaces -- Session 7. Protocols 3 -- Integrating Automated and Interactive Protocol Verification -- A User Interface for a Game-Based Protocol Verification Tool. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Computer security. 
650 0 |a Data encryption (Computer science). 
650 0 |a Information storage and retrieval. 
650 0 |a Computers and civilization. 
650 0 |a Management information systems. 
650 1 4 |a Computer Science. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Encryption. 
650 2 4 |a Systems and Data Security. 
650 2 4 |a Computers and Society. 
650 2 4 |a Management of Computing and Information Systems. 
650 2 4 |a Information Storage and Retrieval. 
700 1 |a Degano, Pierpaolo.  |e editor. 
700 1 |a Guttman, Joshua D.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642124587 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 5983 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-12459-4  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)