Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures

Author:   Alessandro Aldini ,  Roberto Gorrieri
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2011
Volume:   6858
ISBN:  

9783642230813


Pages:   275
Publication Date:   19 August 2011
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $145.17 Quantity:  
Add to Cart

Share |

Foundations of Security Analysis and Design VI: FOSAD Tutorial Lectures


Add your own review!

Overview

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.

Full Product Details

Author:   Alessandro Aldini ,  Roberto Gorrieri
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2011
Volume:   6858
Dimensions:   Width: 15.50cm , Height: 1.50cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642230813


ISBN 10:   3642230814
Pages:   275
Publication Date:   19 August 2011
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Protecting Privacy in Data Release.-An Introduction to Security API Analysis.-Cryptographic Verification by Typing for a Sample Protocol Implementation.-Model-Driven Development of Security-Aware GUIs for Data-Centric Applications.-On Intransitive Non-interference in Some Models of Concurrency.-A Method for Security Governance, Risk, and Compliance (GRC): A Goal-Process Approach.-The Geometry of Lattice Cryptography.-Quantitative Information Flow and Applications to Differential Privacy.-Risk Analysis of Changing and Evolving Systems using CORAS.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List