Theory of Security and Applications

Joint Workshop, TOSCA 2011, Saarbrücken, Germany, March 31 - April 1, 2011, Revised Selected Papers

  • Sebastian Mödersheim
  • Catuscia Palamidessi
Conference proceedings TOSCA 2011

DOI: 10.1007/978-3-642-27375-9

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6993)

Table of contents (12 papers)

  1. Front Matter
  2. Union and Intersection Types for Secure Protocol Implementations
    Michael Backes, Cătălin Hriţcu, Matteo Maffei
    Pages 1-28
  3. Secure Composition of Protocols
    Véronique Cortier
    Pages 29-32
  4. G2C: Cryptographic Protocols from Goal-Driven Specifications
    Michael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk
    Pages 57-77
  5. Modeling Long-Term Signature Validation for Resolution of Dispute
    Moez Ben MBarka, Francine Krief, Olivier Ly
    Pages 78-97
  6. Formal Analysis of Privacy for Anonymous Location Based Services
    Morten Dahl, Stéphanie Delaune, Graham Steel
    Pages 98-112
  7. Formal Analysis of the EMV Protocol Suite
    Joeri de Ruiter, Erik Poll
    Pages 113-129
  8. Security Goals and Protocol Transformations
    Joshua D. Guttman
    Pages 130-147
  9. Model-Checking Secure Information Flow for Multi-threaded Programs
    Marieke Huisman, Henri-Charles Blondeel
    Pages 148-165
  10. Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus
    Florent Jacquemard, Étienne Lozes, Ralf Treinen, Jules Villard
    Pages 166-185
  11. Automated Code Injection Prevention for Web Applications
    Zhengqin Luo, Tamara Rezk, Manuel Serrano
    Pages 186-204
  12. Back Matter

About these proceedings

Introduction

This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011.
The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application.

Keywords

constraint solving cryptographic protocols model checking public key infrastructure secure information flow

Editors and affiliations

  • Sebastian Mödersheim
    • 1
  • Catuscia Palamidessi
    • 2
  1. 1.Richard Petersen PladsmDTU Informaticskgs. LynbyDenmark
  2. 2.INRIAPalaiseau CedexFrance

Bibliographic information

  • Copyright Information Springer-Verlag GmbH Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-27374-2
  • Online ISBN 978-3-642-27375-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349