Ebook: Foundations of Security Analysis and Design IV: FOSAD 2006/2007 Tutorial Lectures
- Tags: Operating Systems, Data Encryption, Computer Communication Networks, Management of Computing and Information Systems, Logics and Meanings of Programs, Programming Languages Compilers Interpreters
- Series: Lecture Notes in Computer Science 4677
- Year: 2007
- Publisher: Springer-Verlag Berlin Heidelberg
- Edition: 1
- Language: English
- pdf
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of research groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects.
This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007. The lectures are devoted to Foundations of Security Analysis and Design.
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of research groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects.
This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007. The lectures are devoted to Foundations of Security Analysis and Design.
Content:
Front Matter....Pages -
Security Protocols: Principles and Calculi....Pages 1-23
Secure Service Orchestration....Pages 24-74
IT Security Analysis Best Practices and Formal Approaches....Pages 75-91
Low-Level Software Security: Attacks and Defenses....Pages 92-134
Enhancing Java Security with History Based Access Control....Pages 135-159
On the Protection and Technologies of Critical Information Infrastructures....Pages 160-182
An Interpretation of Identity-Based Cryptography....Pages 183-208
Trust and Reputation Systems....Pages 209-245
An Introduction to the Role Based Trust Management Framework RT....Pages 246-281
Trusted Mobile Platforms....Pages 282-323
Back Matter....Pages -
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of research groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects.
This book presents thoroughly revised versions of eight tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2006/2007, held in Bertinoro, Italy, in September 2006 and September 2007. The lectures are devoted to Foundations of Security Analysis and Design.
Content:
Front Matter....Pages -
Security Protocols: Principles and Calculi....Pages 1-23
Secure Service Orchestration....Pages 24-74
IT Security Analysis Best Practices and Formal Approaches....Pages 75-91
Low-Level Software Security: Attacks and Defenses....Pages 92-134
Enhancing Java Security with History Based Access Control....Pages 135-159
On the Protection and Technologies of Critical Information Infrastructures....Pages 160-182
An Interpretation of Identity-Based Cryptography....Pages 183-208
Trust and Reputation Systems....Pages 209-245
An Introduction to the Role Based Trust Management Framework RT....Pages 246-281
Trusted Mobile Platforms....Pages 282-323
Back Matter....Pages -
....