|
![]() |
|||
|
||||
OverviewThe Joint Workshop on ""Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security"" (ARSPA-WITS 2009) was held in York, UK, March 28-29, 2009, in association with ETAPS 2009. ARSPA is a series of workshops on ""Automated Reasoning for Security P- tocol Analysis,"" bringing together researchers and practitioners from both the security andthe formalmethods communities,from academiaand industry,who are working on developing and applying automated reasoning techniques and tools for the formal speci?cation and analysis of security protocols. The ?rst two ARSPA workshops were held as satellite events of the Second International JointConferenceon Automated Reasoning(IJCAR 2004)andof the 32nd Int- nationalColloquiumonAutomata,LanguagesandProgramming(ICALP2005), respectively. ARSPA then joined forces with the workshop FCS (Foundations of Computer Security): FCS-ARSPA 2006 was a?liated with LICS 2006, in the context of FLoC 2006,and FCS-ARSPA 2007 was a?liated with LICS 2007 and ICALP 2007. WITSistheo?cialannualworkshoporganizedbytheIFIP WG1.7on""T- oretical Foundations of Security Analysis and Design,"" established to promote the investigation on the theoretical foundations of security, discovering and p- moting new areas of application of theoretical techniques in computer security and supporting the systematic use of formal techniques in the development of security-related applications. This is the ninth meeting in the series. In 2008, ARSPA and WITS joined with the workshop on Foundations of Computer - curityFCSforajointworkshop,FCS-ARSPA-WITS2008,associatedwithLICS 2008 and CSF 21. Full Product DetailsAuthor: Pierpaolo Degano , Luca ViganòPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2009 ed. Volume: 5511 Dimensions: Width: 15.50cm , Height: 1.30cm , Length: 23.50cm Weight: 0.454kg ISBN: 9783642034589ISBN 10: 3642034586 Pages: 223 Publication Date: 03 September 2009 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsA Policy Model for Secure Information Flow.- A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference.- Validating Security Protocols under the General Attacker.- Usage Automata.- Static Detection of Logic Flaws in Service-Oriented Applications.- Improving the Semantics of Imperfect Security.- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data.- Transformations between Cryptographic Protocols.- Formal Validation of OFEPSP+ with AVISPA.- On the Automated Correction of Protocols with Improper Message Encoding.- Finite Models in FOL-Based Crypto-Protocol Verification.- Towards a Type System for Security APIs.- Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption.- How Many Election Officials Does It Take to Change an Election?.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |