Formal Aspects of Security and Trust 7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers / [electronic resource] :
edited by Pierpaolo Degano, Sandro Etalle, Joshua Guttman.
- 1st ed. 2011.
- X, 239 p. online resource.
- Security and Cryptology, 6561 2946-1863 ; .
- Security and Cryptology, 6561 .
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.
9783642197512
10.1007/978-3-642-19751-2 doi
Computer networks .
Cryptography.
Data encryption (Computer science).
Data protection.
Computers and civilization.
Electronic data processing--Management.
Information storage and retrieval systems.
Computer Communication Networks.
Cryptology.
Data and Information Security.
Computers and Society.
IT Operations.
Information Storage and Retrieval.
TK5105.5-5105.9
004.6
This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.
9783642197512
10.1007/978-3-642-19751-2 doi
Computer networks .
Cryptography.
Data encryption (Computer science).
Data protection.
Computers and civilization.
Electronic data processing--Management.
Information storage and retrieval systems.
Computer Communication Networks.
Cryptology.
Data and Information Security.
Computers and Society.
IT Operations.
Information Storage and Retrieval.
TK5105.5-5105.9
004.6