|
|
|
|
LEADER |
02749nmm a2200433 u 4500 |
001 |
EB000379550 |
003 |
EBX01000000000000000232602 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
130626 ||| eng |
020 |
|
|
|a 9783540752271
|
100 |
1 |
|
|a Dimitrakos, Theo
|e [editor]
|
245 |
0 |
0 |
|a Formal Aspects in Security and Trust
|h Elektronische Ressource
|b Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canda, August 26-27, 2006, Revised Selected Papers
|c edited by Theo Dimitrakos, Fabio Martinelli, Peter Y A Ryan, Steve Schneider
|
250 |
|
|
|a 1st ed. 2007
|
260 |
|
|
|a Berlin, Heidelberg
|b Springer Berlin Heidelberg
|c 2007, 2007
|
300 |
|
|
|a VIII, 288 p
|b online resource
|
505 |
0 |
|
|a Strategic Games on Defense Trees -- Timed Calculus of Cryptographic Communication -- A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk -- Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security -- Measuring Anonymity with Relative Entropy -- Formalizing and Analyzing Sender Invariance -- From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust -- A Tool for the Synthesis of Controller Programs -- Where Can an Insider Attack? -- Maintaining Information Flow Security Under Refinement and Transformation -- A Classification of Delegation Schemes for Attribute Authority -- Program Partitioning Using Dynamic Trust Models -- Locality-Based Security Policies -- A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols -- A Formal Specification of the MIDP 2.0 Security Model -- A Comparison of Semantic Models for Noninterference -- Hiding Information in Multi Level Security Systems -- A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks
|
653 |
|
|
|a Computer Communication Networks
|
653 |
|
|
|a Computers and Society
|
653 |
|
|
|a Operating Systems
|
653 |
|
|
|a Operating systems (Computers)
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Information Storage and Retrieval
|
653 |
|
|
|a Electronic data processing / Management
|
653 |
|
|
|a Information storage and retrieval systems
|
653 |
|
|
|a Computer networks
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a IT Operations
|
653 |
|
|
|a Computers and civilization
|
700 |
1 |
|
|a Martinelli, Fabio
|e [editor]
|
700 |
1 |
|
|a Ryan, Peter Y A.
|e [editor]
|
700 |
1 |
|
|a Schneider, Steve
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-540-75227-1
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-540-75227-1?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 004.6
|