This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Formal Aspects of Security, FASec 2002, held in London, UK, in December 2002.
The 11 revised full papers presented together with 7 invited contributions were carefully reviewed, selected, and improved for inclusion in the book. The papers are organized in topical sections on protocol verification, analysis of protocols, security modelling and reasoning, and intrusion detection systems and liveness.
Author(s): Fred B. Schneider (auth.), Ali E. Abdallah, Peter Ryan, Steve Schneider (eds.)
Series: Lecture Notes in Computer Science 2629
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 246
Tags: Data Encryption; Computer Communication Networks; Software Engineering; Operating Systems; Computers and Society; Management of Computing and Information Systems
Front Matter....Pages -
Lifting Reference Monitors from the Kernel....Pages 1-2
Authenticity Types for Cryptographic Protocols....Pages 3-3
Verifying the SET Protocol: Overview....Pages 4-14
Interacting State Machines: A Stateful Approach to Proving Security....Pages 15-32
Automatic Approximation for the Verification of Cryptographic Protocols....Pages 33-48
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis....Pages 49-61
Critical Critical Systems....Pages 62-70
Analysing Security Protocols....Pages 71-80
Analysis of Probabilistic Contract Signing....Pages 81-96
Security Analysis of (Un-) Fair Non-repudiation Protocols....Pages 97-114
Modeling Adversaries in a Logic for Security Protocol Analysis....Pages 115-132
Secure Self-certified Code for Java....Pages 133-151
Z Styles for Security Properties and Modern User Interfaces....Pages 152-166
Cryptographic Challenges: The Past and the Future....Pages 167-182
TAPS: The Last Few Slides....Pages 183-190
Formal Specification for Fast Automatic IDS Training....Pages 191-204
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area....Pages 205-220
Revisiting Liveness Properties in the Context of Secure Systems....Pages 221-238
Back Matter....Pages -