Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Formal Aspects in Security and Trust, FAST 2009, held under the auspices of IFIP WG 1.7 in Eindhoven, The Netherlands, in November 2009 as an event of the Formal Methods Week, FMweek 2009. The 18 revised papers presented together with an abstract of the invited lecture were carefully reviewed and selected from 50 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, Web service security/trust/privacy, grid security, security risk assessment, and case studies.

Author(s): Anindya Banerjee (auth.), Pierpaolo Degano, Joshua D. Guttman (eds.)
Series: Lecture Notes in Computer Science 5983 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2010

Language: English
Pages: 279
Tags: Computer Communication Networks; Data Encryption; Systems and Data Security; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval

Front Matter....Pages -
Semantics and Enforcement of Expressive Information Flow Policies....Pages 1-3
An Algebra for Trust Dilution and Trust Fusion....Pages 4-20
HMM-Based Trust Model....Pages 21-35
Deriving Trust from Experience....Pages 36-50
Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties....Pages 51-65
Model Checking of Security-Sensitive Business Processes....Pages 66-80
Analysing the Information Flow Properties of Object-Capability Patterns....Pages 81-95
Applied Quantitative Information Flow and Statistical Databases....Pages 96-110
Specification and Verification of Side Channel Declassification....Pages 111-125
Secure Information Flow for Distributed Systems....Pages 126-140
Probable Innocence in the Presence of Independent Knowledge....Pages 141-156
A Calculus of Trustworthy Ad Hoc Networks....Pages 157-172
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties....Pages 173-185
Game-Based Verification of Multi-Party Contract Signing Protocols....Pages 186-200
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM....Pages 201-216
Trusted Multiplexing of Cryptographic Protocols....Pages 217-232
Specifying and Modelling Secure Channels in Strand Spaces....Pages 233-247
Integrating Automated and Interactive Protocol Verification....Pages 248-262
A User Interface for a Game-Based Protocol Verification Tool....Pages 263-278
Back Matter....Pages -