Formal aspects in security and trust: third international workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005 : revised selected papers
This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Voting Technologies and Trust
Formal Reasoning About a SpecificationBased Intrusion Detection
A Formal Approach for Reasoning About a Class of DiffieHellman
13 other sections not shown
Other editions - View all
abstract abstract interpretation access control action Alice Alice and Bob analysis annotated anonymity applied approach assume assumptions attacker authorisation binary bisimulation channel command compilation Computer Security configuration consider data flows defined Definition delegation denote deontic Diffie-Hellman domain DRCP DRCP server encryption equivalence relation equivalent evidence example execution finite formal given global security requirements identity IEEE initial institutional agent instruction intrusion detection IP address IPsec KcomA label language Lemma LNCS logic memory protection meta-variables monitor network security node non-repudiation non-repudiation protocol notion observation function obtain opacity operational semantics operations paper party Petri nets postcondition principal probabilistic probable innocence problem proof obligations properties protection systems protocol RBAC relation represents role Section secure information flow security level security policy semantics software agent specification-based subterfuge Theorem transform trust trustee units trustworthiness type rules type system variables verification vote VPNmembers