Formal Aspects of Security and Trust

7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers

  • Pierpaolo Degano
  • Sandro Etalle
  • Joshua Guttman
Conference proceedings FAST 2010

DOI: 10.1007/978-3-642-19751-2

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6561)

Table of contents

  1. Front Matter
  2. Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov
    Pages 18-33
  3. Bruno Conchinha, David Basin, Carlos Caleiro
    Pages 34-49
  4. Allaa Kamil, Gavin Lowe
    Pages 50-64
  5. Mana Taghdiri, Gregor Snelting, Carsten Sinz
    Pages 65-79
  6. Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer
    Pages 80-95
  7. Sibylle Fröschle, Nils Sommer
    Pages 96-110
  8. Stéphanie Delaune, Steve Kremer, Mark D. Ryan, Graham Steel
    Pages 111-125
  9. Meilof Veeningen, Benne de Weger, Nicola Zannone
    Pages 126-140
  10. Tim Muller
    Pages 141-156
  11. Clément Hurlin, Hélène Kirchner
    Pages 157-175
  12. Raphael Khoury, Nadia Tawbi
    Pages 176-190
  13. Francesco Ballardin, Massimo Merro
    Pages 206-222
  14. Naipeng Dong, Hugo Jonker, Jun Pang
    Pages 223-238
  15. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.

Keywords

access control attack-defense trees auction protocols authentication cryptographic enforcement decision procedures information flow analysis message deducibility network security protocols secure communication channels security policies trust networks trust semantics

Editors and affiliations

  • Pierpaolo Degano
    • 1
  • Sandro Etalle
    • 2
  • Joshua Guttman
    • 3
  1. 1.Dipartimento di InformaticaUniversità di PisaPisaItaly
  2. 2.Faculty of Mathematics and Computer ScienceTechnical University of EindhovenEindhovenThe Netherlands
  3. 3.Computer ScienceWorcester Polytechnic InstituteWorcesterUSA

Bibliographic information

  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-19750-5
  • Online ISBN 978-3-642-19751-2
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349