Formal Aspects in Security and Trust (vol. # 3866) : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers (Englisch)
- Neue Suche nach: Dimitrakos, Theo
- Neue Suche nach: Martinelli, Fabio
- Neue Suche nach: Ryan, Peter
- Neue Suche nach: Schneider, Steve
2006
-
ISBN:
- Konferenzband / Elektronische Ressource
-
Titel:Formal Aspects in Security and Trust (vol. # 3866) : Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers
-
Beteiligte:
-
Kongress:FAST 2005 ; 3 ; 2005 ; Newcastle upon Tyne
International Workshop on Formal Aspects in Security and Trust ; 3 ; 2005 ; Newcastle upon Tyne -
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:2006
-
Format / Umfang:Online-Ressource (X, 259 p. Also available online, digital)
-
Anmerkungen:Lizenzpflichtig
-
ISBN:
-
DOI:
-
Medientyp:Konferenzband
-
Format:Elektronische Ressource
-
Sprache:Englisch
- Neue Suche nach: 005.8 / 004.6
- Weitere Informationen zu Dewey Decimal Classification
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:Telekommunikationsnetz , Datensicherung , Computersicherheit , Anonymität , Verteiltes System , Formale Methode , VertraulichkeitComputer Science , Data encryption (Computer science) , Cryptography. , Information storage and retrieval systems , Information Systems , Computer science , Computer networks . , Trust , Computer security , Formal methods (Computer science) , Electronic data processing , Operating systems (Computers) , Computer Communication Networks , Computers and civilization.
-
Klassifikation:
-
Datenquelle:
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Voting Technologies and TrustRandell, B. / Ryan, P. Y. A. et al. | 2006
- 5
-
On the Formal Analyses of the Zhou-Gollmann Non-repudiation ProtocolPancho-Festin, S. / Gollmann, D. et al. | 2006
- 16
-
Formal Reasoning About a Specification-Based Intrustion Detection for Dynamic Auto-configuration Protocols in Ad Hoc NetworksSong, T. / Ko, C. / Tseng, C. H. / Balasubramanyam, P. / Chaudhary, A. / Levitt, K. N. et al. | 2006
- 34
-
A Formal Approach for Reasoning About a Class of Diffie-Hellman ProtocolsDelicata, R. / Schneider, S. et al. | 2006
- 47
-
Eliminating Implicit Information Leaks by Transformational Typing and UnificationKopf, B. / Mantel, H. et al. | 2006
- 63
-
Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security AnnotationsDe Francesco, N. / Martini, L. et al. | 2006
- 81
-
Opacity Generalised to Transition SystemsBryans, J. W. / Koutny, M. / Mazare, L. / Ryan, P. Y. A. et al. | 2006
- 96
-
Unifying Decidability Results on Protection Systems Using SimulationsEnea, C. et al. | 2006
- 112
-
Proof Obligations Preserving CompilationBarthe, G. / Rezk, T. / Saabas, A. et al. | 2006
- 127
-
A Logic for Analysing Subterfuge in Delegation ChainsZhou, H. / Foley, S. N. et al. | 2006
- 142
-
Probable Innocence RevisitedChatzikokolakis, K. / Palamidessi, C. et al. | 2006
- 158
-
Relative TrustworthinessKluwer, J. W. / Waaler, A. et al. | 2006
- 171
-
Secure Untrusted Binaries - Provably!Winwood, S. / Chakravarty, M. M. T. et al. | 2006
- 187
-
Normative Specification: A Tool for Trust and SecurityPacheco, O. et al. | 2006
- 203
-
Type-Based Distributed Access Control vs. Untyped AttackersChothia, T. / Duggan, D. et al. | 2006
- 217
-
A Security Management Information Model Derivation Framework: From Goals to ConfigurationsLaborde, R. / Barrere, F. / Benzekri, A. et al. | 2006
- 235
-
On Anonymity with Identity EscrowMukhamedov, A. / Ryan, M. D. et al. | 2006
- 244
-
Towards Verification of Timed Non-repudiation ProtocolsWei, K. / Heather, J. et al. | 2006