Formal Aspects in Security and Trust

Thrid International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers

  • Theo Dimitrakos
  • Fabio Martinelli
  • Peter Y. A. Ryan
  • Steve Schneider
Conference proceedings FAST 2005

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3866)

Table of contents

  1. Front Matter
  2. Brian Randell, Peter Y. A. Ryan
    Pages 1-4
  3. Susan Pancho-Festin, Dieter Gollmann
    Pages 5-15
  4. Tao Song, Calvin Ko, Chinyang Henry Tseng, Poornima Balasubramanyam, Anant Chaudhary, Karl N. Levitt
    Pages 16-33
  5. Jeremy W. Bryans, Maciej Koutny, Laurent Mazaré, Peter Y. A. Ryan
    Pages 81-95
  6. Gilles Barthe, Tamara Rezk, Ando Saabas
    Pages 112-126
  7. Hongbin Zhou, Simon N. Foley
    Pages 127-141
  8. Konstantinos Chatzikokolakis, Catuscia Palamidessi
    Pages 142-157
  9. Johan W. Klüwer, Arild Waaler
    Pages 158-170
  10. Simon Winwood, Manuel M. T. Chakravarty
    Pages 171-186
  11. Tom Chothia, Dominic Duggan
    Pages 203-216
  12. Aybek Mukhamedov, Mark D. Ryan
    Pages 235-243
  13. Kun Wei, James Heather
    Pages 244-257
  14. Back Matter

About these proceedings

Introduction


This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.

The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Keywords

information privacy security tools trust ubiquitous computing

Editors and affiliations

  • Theo Dimitrakos
    • 1
  • Fabio Martinelli
    • 2
  • Peter Y. A. Ryan
    • 3
  • Steve Schneider
    • 4
  1. 1.BT Group Chief Technology OfficeIpswichUK
  2. 2.IIT CNR, PisaPisaItaly
  3. 3.University of NewcastleUK
  4. 4.Department of ComputingUniversity of SurreyUK

Bibliographic information

  • DOI https://doi.org/10.1007/11679219
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-32628-1
  • Online ISBN 978-3-540-32629-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book