Formal Aspects of Security: First International Conference, FASec 2002, London, UK, December 16-18, 2002. Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Formal Aspects of Security, FASec 2002, held in London, UK, in December 2002.

The 11 revised full papers presented together with 7 invited contributions were carefully reviewed, selected, and improved for inclusion in the book. The papers are organized in topical sections on protocol verification, analysis of protocols, security modelling and reasoning, and intrusion detection systems and liveness.

Author(s): Fred B. Schneider (auth.), Ali E. Abdallah, Peter Ryan, Steve Schneider (eds.)
Series: Lecture Notes in Computer Science 2629
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 246
Tags: Data Encryption; Computer Communication Networks; Software Engineering; Operating Systems; Computers and Society; Management of Computing and Information Systems

Front Matter....Pages -
Lifting Reference Monitors from the Kernel....Pages 1-2
Authenticity Types for Cryptographic Protocols....Pages 3-3
Verifying the SET Protocol: Overview....Pages 4-14
Interacting State Machines: A Stateful Approach to Proving Security....Pages 15-32
Automatic Approximation for the Verification of Cryptographic Protocols....Pages 33-48
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis....Pages 49-61
Critical Critical Systems....Pages 62-70
Analysing Security Protocols....Pages 71-80
Analysis of Probabilistic Contract Signing....Pages 81-96
Security Analysis of (Un-) Fair Non-repudiation Protocols....Pages 97-114
Modeling Adversaries in a Logic for Security Protocol Analysis....Pages 115-132
Secure Self-certified Code for Java....Pages 133-151
Z Styles for Security Properties and Modern User Interfaces....Pages 152-166
Cryptographic Challenges: The Past and the Future....Pages 167-182
TAPS: The Last Few Slides....Pages 183-190
Formal Specification for Fast Automatic IDS Training....Pages 191-204
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area....Pages 205-220
Revisiting Liveness Properties in the Context of Secure Systems....Pages 221-238
Back Matter....Pages -