Theory of Security and Applications Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers /

This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented tog...

Full description

Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Mödersheim, Sebastian (Editor), Palamidessi, Catuscia (Editor)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.
Series:Lecture Notes in Computer Science, 6993
Subjects:
Online Access:Full Text via HEAL-Link
LEADER 02885nam a22005655i 4500
001 978-3-642-27375-9
003 DE-He213
005 20151029231226.0
007 cr nn 008mamaa
008 120110s2012 gw | s |||| 0|eng d
020 |a 9783642273759  |9 978-3-642-27375-9 
024 7 |a 10.1007/978-3-642-27375-9  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Theory of Security and Applications  |h [electronic resource] :  |b Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers /  |c edited by Sebastian Mödersheim, Catuscia Palamidessi. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg,  |c 2012. 
300 |a IX, 225 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6993 
520 |a This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 0 |a Software engineering. 
650 0 |a Programming languages (Electronic computers). 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Computers and civilization. 
650 1 4 |a Computer Science. 
650 2 4 |a Data Encryption. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Computers and Society. 
650 2 4 |a Algorithm Analysis and Problem Complexity. 
650 2 4 |a Software Engineering. 
650 2 4 |a Programming Languages, Compilers, Interpreters. 
700 1 |a Mödersheim, Sebastian.  |e editor. 
700 1 |a Palamidessi, Catuscia.  |e editor. 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783642273742 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 6993 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-27375-9  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645)