Foundations of Security Analysis and Design II: FOSAD 2001/2002 Tutorial Lectures

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness.

This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro, Italy, in September 2001 and September 2002. The lectures are devoted to:

- Formal Approaches to Approximating Noninterference Properties

- The Key Establishment Problem

- Name-Passing Calculi and Cryptoprimitives

- Classification of Security Properties; Network Security

- Cryptographic Algorithms for Multimedia Traffic

- Security for Mobility

Author(s): Alessandro Aldini, Mario Bravetti (auth.), Riccardo Focardi, Roberto Gorrieri (eds.)
Series: Lecture Notes in Computer Science 2946
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004

Language: English
Pages: 272
Tags: Operating Systems; Computer Communication Networks; Programming Languages, Compilers, Interpreters; Data Encryption; Logics and Meanings of Programs; Management of Computing and Information Systems

Front Matter....Pages -
Two Formal Approaches for Approximating Noninterference Properties....Pages 1-43
The Key Establishment Problem....Pages 44-90
A Survey of Name-Passing Calculi and Crypto-Primitives....Pages 91-138
Classification of Security Properties....Pages 139-185
Cryptographic Algorithms for Multimedia Traffic....Pages 186-206
Security for Mobility....Pages 207-265
Back Matter....Pages -