Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security: Joint Workshop, ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010, Revised Selected Papers

Front Cover
Alessandro Armando, Gavin Lowe
Springer Science & Business Media, Oct 8, 2010 - Computers - 185 pages
ThisvolumecontainstheworkshopproceedingsofARSPA-WITS2010,theJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, held during March 27-28, 2010 in Paphos (Cyprus). ARSPA-WITS2010o'eredaforumfordiscussingnewresultsintheoriesofc- putersecurity,openquestionsandfundamentalconcernsaboutexistingtheories, and issues related to the development and application of automated reas- ing techniques and tools for the formal speci'cation and analysis of security protocols. There were 28 submissions. All the submissions were thoroughly evaluated on the basis of at least three referee reports, and an electronic Program C- mittee meeting was held by using the EasyChair on-line conference system. The committee decided to accept the 11 papers included in this volume. The authors were giventhe opportunity to revise their paper in light of the feedback received during the workshop. The workshop program was enriched by two invited talks by Flemming Nielson and Catuscia Palamidessi, whose titles and abstracts are also included in this volume. April 2010 Alessandro Armando Gavin Lowe Conference Organization Program Chairs Alessandro Armando Università di Genova, Italy (Co-chair) Gavin Lowe Oxford University, UK (Co-chair) Program Committee Lujo Bauer CMU, USA Yannick Chevalier Université Toulouse III, France Luca Compagna SAP Research, France Cas Cremers ETHZ, Switzerland Jorge Cuellar Siemens, Germany Pierpaolo Degano Università di Pisa, Italy Sandro Etalle Technical University of Eindhoven and University of Twente, The Netherlands Riccardo Focardi Università di Venezia, Italy Dieter Gollman Technische Universität Hamburg-Harburg, Germany Joshua Guttman MITRE, USA Jan Jürjens TU Dortmund and Fraunhofer ISST, Germany Gavin Lowe Oxford University, UK (Co-chair) Catherine Meadows Naval Research Laboratory, USA John Mitchell Stanford University, USA
 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

The CaPiTo Approach to Protocol Validation
1
Reasoning about Probabilistic Security Using TaskPIOAs
2
Secrecy and Authenticity Types for Secure Distributed Messaging
23
Modular Plans for Secure Service Composition
41
A Type System for Access Control Views in ObjectOriented Languages
59
Formal Analysis of Key Integrity in PKCS11
77
Secure Upgrade of Hardware Security Modules in Bank Networks
95
Interactive Information Flow
111
Representing Attack Scenarios Spanning through the Physical Digital and Social Domain
112
Proving Integrity by Equality
130
Towards Automatic Analysis of Election Verifiability Properties
146
AnBx Security Protocols Design and Verification
164
Author Index
185
Copyright

Other editions - View all

Common terms and phrases