Formal Aspects in Security and Trust
87,99
versandkostenfrei*

Preis in Euro, inkl. MwSt.
Versandfertig in 6-10 Tagen
Bequeme Ratenzahlung möglich!
ab 4,29 monatlich
44 °P sammeln

    Broschiertes Buch

Second International Workshop on Formal Aspects in Security and Trust is an essential reference for both academic and professional researchers in the field of security and trust.
Because of the complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts, we also need to develop new, scalable, and more flexible foundational models of pervasive security enforcement across organizational borders and in situations where there is high uncertainty about the identity and trustworthiness of the participating networked entites. On the other hand, the…mehr

Produktbeschreibung
Second International Workshop on Formal Aspects in Security and Trust is an essential reference for both academic and professional researchers in the field of security and trust.

Because of the complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts, we also need to develop new, scalable, and more flexible foundational models of pervasive security enforcement across organizational borders and in situations where there is high uncertainty about the identity and trustworthiness of the participating networked entites. On the other hand, the increasingly complex set of building activities sharing different resources but managed with different policies calls for new and business-enabling models of trust between members of virtual organizations and communities that span the boundaries of physical enterprises and loosely structured groups of individuals.

The papers presented in this volume address the challenges posed by "ambient intelligence space" as a future paradigm and the need for a set of concepts, tools and methodologies to enable the user's trust and confidence in the underlying computing infrastructure.

This state-of-the-art volume presents selected papers from the 2nd International Workshop on Formal Aspects in Security and Trust, held in conjuuctions with the 18th IFIP World Computer Congress, August 2004, in Toulouse, France.

The collection will be important not only for computer security experts and researchers but also for teachers and adminstrators interested in security methodologies and research.
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing. For more information about the 300 other books in the IFIP series, please visit www.springeronline.com. For more information about IFIP, please visit www.ifip.or.at. Second International Workshop on Formal Aspects in Security and Trust is an essential reference for both academic and professional researchers in the field of security and trust. Because of the complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts, we also need to develop new, scalable, and more flexible foundational models of pervasive security enforcement across organizational borders and in situations where there is high uncertainty about the identity and trustworthiness of the participating networked entites. On the other hand, the increasingly complex set of building activities sharing different resources but managed with different policies calls for new and business-enabling models of trust between members of virtual organizations and communities that span the boundaries of physical enterprises and loosely structured groups of individuals. The papers presented in this volume address the challenges posed by "ambient intelligence space" as a future paradigm and the need for a set of concepts, tools and methodologies to enable the user's trust and confidence in the underlying computing infrastructure. This state-of-the-art volume presents selected papers from the 2nd International Workshop on Formal Aspects in Security and Trust, held in conjuuctions with the 18th IFIP World Computer Congress, August 2004, in Toulouse, France. The collection will be important not only for computer security experts and researchers but also for teachers and adminstrators interested in security methodologies and research.
  • Produktdetails
  • IFIP Advances in Information and Communication Technology Vol.173
  • Verlag: Springer, Berlin
  • Softcover reprint of hardcover 1st ed. 2005
  • Seitenzahl: 256
  • Erscheinungstermin: 6. Dezember 2010
  • Englisch
  • Abmessung: 235mm x 155mm x 13mm
  • Gewicht: 392g
  • ISBN-13: 9781441936851
  • ISBN-10: 1441936858
  • Artikelnr.: 32109862
Inhaltsangabe
Security Issues in the Tuple-Space Coordination Model.- Information Flow Analysis for Probabilistic Timed Automata.- Dynamic Security Labels and Noninterference (Extended Abstract).- Formal Analysis of a Fair Payment Protocol.- Pattern-Matching Spi-Calculus.- Decidability of Opacity with Non-Atomic Keys.- Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards.- Family Secrets.- An Interactive Trust Management and Negotiation Scheme.- Complementing Computational Protocol Analysis with Formal Specifications.- A Trust Model with Statistical Foundation.- Modelling Dynamic Opacity Using Petri Nets with Silent Actions.- Reasoning about Secure Interoperation Using Soft Constraints.- A Logic for Auditing Accountability in Decentralized Systems.- A Formal Approach to Specify and Deploy a Network Security Policy.- Discretionary Overriding of Access Control in the Privilege Calculus.- A Formal Model for Parameterized Role-Based Access Control.