Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of research groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects.

This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007. The lectures are devoted to Foundations of Security Analysis and Design.

Author(s): Martín Abadi (auth.), Alessandro Aldini, Roberto Gorrieri (eds.)
Series: Lecture Notes in Computer Science 4677 : Security and Cryptology
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2007

Language: English
Pages: 328
Tags: Operating Systems; Data Encryption; Computer Communication Networks; Management of Computing and Information Systems; Logics and Meanings of Programs; Programming Languages, Compilers, Interpreters

Front Matter....Pages -
Security Protocols: Principles and Calculi....Pages 1-23
Secure Service Orchestration....Pages 24-74
IT Security Analysis Best Practices and Formal Approaches....Pages 75-91
Low-Level Software Security: Attacks and Defenses....Pages 92-134
Enhancing Java Security with History Based Access Control....Pages 135-159
On the Protection and Technologies of Critical Information Infrastructures....Pages 160-182
An Interpretation of Identity-Based Cryptography....Pages 183-208
Trust and Reputation Systems....Pages 209-245
An Introduction to the Role Based Trust Management Framework RT....Pages 246-281
Trusted Mobile Platforms....Pages 282-323
Back Matter....Pages -