Second International Workshop on Formal Aspects in Security and Trust is an essential reference for both academic and professional researchers in the field of security and trust. Because of the complexity and scale of deployment of emerging ICT systems based on web service and grid computing concepts, we also need to develop new, scalable, and more flexible foundational models of pervasive security enforcement across organizational borders and in situations where there is high uncertainty about the identity and trustworthiness of the participating networked entites.  On the other hand, the increasingly complex set of building activities sharing different resources but managed with different policies calls for new and business-enabling models of trust between members of virtual organizations and communities that span the boundaries of physical enterprises and loosely structured groups of individuals. The papers presented in this volume address the challenges posed by "ambient intelligence space" as a future paradigm and the need for a set of concepts, tools and methodologies to enable the user's trust and confidence in the underlying computing infrastructure.  This state-of-the-art volume presents selected papers from the 2nd International Workshop on Formal Aspects in Security and Trust, held in conjuuctions with the 18th IFIP World Computer Congress, August 2004, in Toulouse, France. The collection will be important not only for computer security experts and researchers but also for teachers and adminstrators interested in security methodologies and research.
Les mer
Security Issues in the Tuple-Space Coordination Model.- Information Flow Analysis for Probabilistic Timed Automata.- Dynamic Security Labels and Noninterference (Extended Abstract).- Formal Analysis of a Fair Payment Protocol.- Pattern-Matching Spi-Calculus.- Decidability of Opacity with Non-Atomic Keys.- Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards.- Family Secrets.- An Interactive Trust Management and Negotiation Scheme.- Complementing Computational Protocol Analysis with Formal Specifications.- A Trust Model with Statistical Foundation.- Modelling Dynamic Opacity Using Petri Nets with Silent Actions.- Reasoning about Secure Interoperation Using Soft Constraints.- A Logic for Auditing Accountability in Decentralized Systems.- A Formal Approach to Specify and Deploy a Network Security Policy.- Discretionary Overriding of Access Control in the Privilege Calculus.- A Formal Model for Parameterized Role-Based Access Control.
Les mer
International Federation for Information Processing The IFIP series publishes state-of-the-art results in the sciences and technologies of information and communication.  The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction.  Proceedings and post-proceedings of referred international conferences in computer science and interdisciplinary fields are featured.  These results often precede journal publication and represent the most current research.  The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.   For more information about the 300 other books in the IFIP series, please visit www.springeronline.com.   For more information about IFIP, please visit www.ifip.or.at.
Les mer
Presents the most current research, both professional and academic, in the fields of computer security and trust authentication Includes supplementary material: sn.pub/extras

Produktdetaljer

ISBN
9781441936851
Publisert
2010-12-06
Utgiver
Vendor
Springer-Verlag New York Inc.
Høyde
235 mm
Bredde
155 mm
Aldersnivå
Research, P, 06
Språk
Product language
Engelsk
Format
Product format
Heftet