12th IEEE Computer Security Foundations Workshop: Proceedings of the 12th IEEE Computer Security Foundations Workshop : June 28-30, 1999, Mordano, Italy

Front Cover
IEEE Computer Society Press, 1999 - Computers - 239 pages
Formal models; notation, transformation, and simplification in security protocol analysis; strand spaces; local names; interaction and composition; logics for authorization and access control; advances in automated security protocol analysis; and non-interference using process algebras are the general themes of the 19 papers. The topics include a formal framework and evaluation method for the network denial of service, a meta-notation for protocol analysis, honest functions and their applications to the analysis of cryptographic protocols, the formalization and proof of secrecy properties, the secure composition of insecure components, and a logical framework for reasoning on data access control policies. Only authors are indexed. Annotation copyrighted by Book News, Inc., Portland, OR.

From inside the book

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

IO Automaton Models and Proofs for SharedKey Communication Systems
14
Notation Transformation and Simplification
31
Decision Procedures for the Analysis of Cryptographic Protocols by Logics of Belief
44
Copyright

12 other sections not shown

Common terms and phrases

Bibliographic information