Skip to main content
  • Conference proceedings
  • © 2007

Foundations of Security Analysis and Design

FOSAD 2006/2007 Turtorial Lectures

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4677)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): FOSAD: International School on Foundations of Security Analysis and Design

Conference proceedings info: FOSAD 2007. FOSAD 2006.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (10 papers)

  1. Front Matter

  2. Foundations of Security Analysis and Design

    1. Security Protocols: Principles and Calculi

      • Martín Abadi
      Pages 1-23
    2. Secure Service Orchestration

      • Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino
      Pages 24-74
    3. Low-Level Software Security: Attacks and Defenses

      • Úlfar Erlingsson
      Pages 92-134
    4. Enhancing Java Security with History Based Access Control

      • Fabio Martinelli, Paolo Mori
      Pages 135-159
    5. On the Protection and Technologies of Critical Information Infrastructures

      • Javier Lopez, Cristina Alcaraz, Rodrigo Roman
      Pages 160-182
    6. Trust and Reputation Systems

      • Audun Jøsang
      Pages 209-245
    7. An Introduction to the Role Based Trust Management Framework RT

      • Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough
      Pages 246-281
    8. Trusted Mobile Platforms

      • Eimear Gallery, Chris J. Mitchell
      Pages 282-323
  3. Back Matter

Other Volumes

  1. Foundations of Security Analysis and Design IV

Keywords

  • IT security
  • Information
  • Java
  • authentication
  • cryptanalysis
  • cryptographic hardware
  • cryptography
  • cypher implementation
  • hardware implementation
  • intrusion detection
  • java security
  • privacy
  • security
  • side-channel attacks
  • smart cards

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions