Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers

Author:   Pierpaolo Degano ,  Luca Viganò
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2009 ed.
Volume:   5511
ISBN:  

9783642034589


Pages:   223
Publication Date:   03 September 2009
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $171.47 Quantity:  
Add to Cart

Share |

Foundations and Applications of Security Analysis: Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers


Add your own review!

Overview

The Joint Workshop on ""Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security"" (ARSPA-WITS 2009) was held in York, UK, March 28-29, 2009, in association with ETAPS 2009. ARSPA is a series of workshops on ""Automated Reasoning for Security P- tocol Analysis,"" bringing together researchers and practitioners from both the security andthe formalmethods communities,from academiaand industry,who are working on developing and applying automated reasoning techniques and tools for the formal speci?cation and analysis of security protocols. The ?rst two ARSPA workshops were held as satellite events of the Second International JointConferenceon Automated Reasoning(IJCAR 2004)andof the 32nd Int- nationalColloquiumonAutomata,LanguagesandProgramming(ICALP2005), respectively. ARSPA then joined forces with the workshop FCS (Foundations of Computer Security): FCS-ARSPA 2006 was a?liated with LICS 2006, in the context of FLoC 2006,and FCS-ARSPA 2007 was a?liated with LICS 2007 and ICALP 2007. WITSistheo?cialannualworkshoporganizedbytheIFIP WG1.7on""T- oretical Foundations of Security Analysis and Design,"" established to promote the investigation on the theoretical foundations of security, discovering and p- moting new areas of application of theoretical techniques in computer security and supporting the systematic use of formal techniques in the development of security-related applications. This is the ninth meeting in the series. In 2008, ARSPA and WITS joined with the workshop on Foundations of Computer - curityFCSforajointworkshop,FCS-ARSPA-WITS2008,associatedwithLICS 2008 and CSF 21.

Full Product Details

Author:   Pierpaolo Degano ,  Luca Viganò
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2009 ed.
Volume:   5511
Dimensions:   Width: 15.50cm , Height: 1.30cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642034589


ISBN 10:   3642034586
Pages:   223
Publication Date:   03 September 2009
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

A Policy Model for Secure Information Flow.- A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference.- Validating Security Protocols under the General Attacker.- Usage Automata.- Static Detection of Logic Flaws in Service-Oriented Applications.- Improving the Semantics of Imperfect Security.- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data.- Transformations between Cryptographic Protocols.- Formal Validation of OFEPSP+ with AVISPA.- On the Automated Correction of Protocols with Improper Message Encoding.- Finite Models in FOL-Based Crypto-Protocol Verification.- Towards a Type System for Security APIs.- Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption.- How Many Election Officials Does It Take to Change an Election?.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List