Formal Aspects in Security and Trust: Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"


This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.

The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Author(s): Brian Randell, Peter Y. A. Ryan (auth.), Theo Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider (eds.)
Series: Lecture Notes in Computer Science 3866 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2006

Language: English
Pages: 259
Tags: Computer Communication Networks; Data Encryption; Operating Systems; Computers and Society; Management of Computing and Information Systems; Information Storage and Retrieval

Front Matter....Pages -
Voting Technologies and Trust....Pages 1-4
On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol....Pages 5-15
Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks....Pages 16-33
A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols....Pages 34-46
Eliminating Implicit Information Leaks by Transformational Typing and Unification....Pages 47-62
Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations....Pages 63-80
Opacity Generalised to Transition Systems....Pages 81-95
Unifying Decidability Results on Protection Systems Using Simulations....Pages 96-111
Proof Obligations Preserving Compilation....Pages 112-126
A Logic for Analysing Subterfuge in Delegation Chains....Pages 127-141
Probable Innocence Revisited....Pages 142-157
Relative Trustworthiness....Pages 158-170
Secure Untrusted Binaries — Provably!....Pages 171-186
Normative Specification: A Tool for Trust and Security....Pages 187-202
Type-Based Distributed Access Control vs. Untyped Attackers....Pages 203-216
A Security Management Information Model Derivation Framework: From Goals to Configurations....Pages 217-234
On Anonymity with Identity Escrow....Pages 235-243
Towards Verification of Timed Non-repudiation Protocols....Pages 244-257
Back Matter....Pages -