Formal Aspects of Security First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers

Bibliographic Details
Other Authors: Abdallah, Ali E. (Editor), Ryan, Peter (Editor), Schneider, Steve (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2003, 2003
Edition:1st ed. 2003
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 02717nmm a2200421 u 4500
001 EB000655681
003 EBX01000000000000000508763
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783540409816 
100 1 |a Abdallah, Ali E.  |e [editor] 
245 0 0 |a Formal Aspects of Security  |h Elektronische Ressource  |b First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers  |c edited by Ali E. Abdallah, Peter Ryan, Steve Schneider 
250 |a 1st ed. 2003 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2003, 2003 
300 |a X, 246 p  |b online resource 
505 0 |a Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems 
653 |a Computer Communication Networks 
653 |a Computers and Society 
653 |a Operating Systems 
653 |a Software engineering 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Software Engineering 
653 |a Electronic data processing / Management 
653 |a Computer networks  
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a IT Operations 
653 |a Computers and civilization 
700 1 |a Ryan, Peter  |e [editor] 
700 1 |a Schneider, Steve  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/b94774 
856 4 0 |u https://doi.org/10.1007/b94774?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6