This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Formal Aspects in Security and Trust, FAST 2009, held under the auspices of IFIP WG 1.7 in Eindhoven, The Netherlands, in November 2009 as an event of the Formal Methods Week, FMweek 2009. The 18 revised papers presented together with an abstract of the invited lecture were carefully reviewed and selected from 50 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, Web service security/trust/privacy, grid security, security risk assessment, and case studies.
Author(s): Anindya Banerjee (auth.), Pierpaolo Degano, Joshua D. Guttman (eds.)
Series: Lecture Notes in Computer Science 5983 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010
Language: English
Pages: 279
Tags: Computer Communication Networks; Data Encryption; Systems and Data Security; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval
Front Matter....Pages -
Semantics and Enforcement of Expressive Information Flow Policies....Pages 1-3
An Algebra for Trust Dilution and Trust Fusion....Pages 4-20
HMM-Based Trust Model....Pages 21-35
Deriving Trust from Experience....Pages 36-50
Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties....Pages 51-65
Model Checking of Security-Sensitive Business Processes....Pages 66-80
Analysing the Information Flow Properties of Object-Capability Patterns....Pages 81-95
Applied Quantitative Information Flow and Statistical Databases....Pages 96-110
Specification and Verification of Side Channel Declassification....Pages 111-125
Secure Information Flow for Distributed Systems....Pages 126-140
Probable Innocence in the Presence of Independent Knowledge....Pages 141-156
A Calculus of Trustworthy Ad Hoc Networks....Pages 157-172
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties....Pages 173-185
Game-Based Verification of Multi-Party Contract Signing Protocols....Pages 186-200
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM....Pages 201-216
Trusted Multiplexing of Cryptographic Protocols....Pages 217-232
Specifying and Modelling Secure Channels in Strand Spaces....Pages 233-247
Integrating Automated and Interactive Protocol Verification....Pages 248-262
A User Interface for a Game-Based Protocol Verification Tool....Pages 263-278
Back Matter....Pages -