Advertisement

Foundations of Security Analysis and Design III

FOSAD 2004/2005 Tutorial Lectures

  • Alessandro Aldini
  • Roberto Gorrieri
  • Fabio Martinelli
Textbook FOSAD 2005, FOSAD 2004

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3655)

Table of contents

  1. Front Matter
  2. FOSAD 2004 (6-11 September 2004)

    1. Michael Backes, Birgit Pfitzmann, Michael Waidner
      Pages 1-41
    2. François Koeune, François-Xavier Standaert
      Pages 78-108
    3. Riccardo Focardi
      Pages 109-132
  3. FOSAD 2005 (19-24 September 2005)

    1. Gilles Barthe, Guillaume Dufay
      Pages 133-177
    2. Elisa Bertino, Ji-Won Byun, Ninghui Li
      Pages 178-206
    3. Paolo Giorgini, Fabio Massacci, Nicola Zannone
      Pages 237-272
  4. Back Matter

About this book

Introduction

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The “Int- national School on Foundations of Security Analysis and Design” (FOSAD, see http://www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea,especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http://www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer’s LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005.

Keywords

Unified Modeling Language (UML) authentication cryptanalysis cryptographic hardware cypher implementation formal method hardware implementation intrusion detection privacy security security engineering side-channel attacks smart cards systems security trust requirements

Editors and affiliations

  • Alessandro Aldini
    • 1
  • Roberto Gorrieri
    • 2
  • Fabio Martinelli
    • 3
  1. 1.Istituto di Scienze e Tecnologie dell’InformazioneUniversità degli Studi di Urbino “Carlo Bo”UrbinoItaly
  2. 2.Dipartimento di Scienze dell’InformazioneUniversità di BolognaBolognaItaly
  3. 3.IIT CNR, PisaPisaItaly

Bibliographic information

  • DOI https://doi.org/10.1007/11554578
  • Copyright Information Springer-Verlag Berlin Heidelberg 2005
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-28955-5
  • Online ISBN 978-3-540-31936-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site