skip to content
Foundations and Applications of Security Analysis : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers Preview this item
ClosePreview this item
Checking...

Foundations and Applications of Security Analysis : Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers

Author: Pierpaolo Degano; Luca Viganò
Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2009.
Series: SpringerLink: Springer e-Books; Lecture Notes in Computer Science, 5511.
Edition/Format:   Computer file : English : Online-ausgView all editions and formats
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Additional Physical Format: Erscheint auch als
Foundations and applications of security analysis.
Berlin ; Heidelberg ; New York, NY : Springer, 2009
X, 221 S., graph. Darst.
Druck-Ausgabe
(DE-101)995338558
Material Type: Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Pierpaolo Degano; Luca Viganò
ISBN: 9783642034596 3642034594 9783642034589 3642034586
OCLC Number: 608613652
Reproduction Notes: Online-Ausg. Berlin [u.a.] Springer, 2009. online-Ressource.
Description: S.
Contents: A Policy Model for Secure Information Flow.- A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference.- Validating Security Protocols under the General Attacker.- Usage Automata.- Static Detection of Logic Flaws in Service-Oriented Applications.- Improving the Semantics of Imperfect Security.- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data.- Transformations between Cryptographic Protocols.- Formal Validation of OFEPSP+ with AVISPA.- On the Automated Correction of Protocols with Improper Message Encoding.- Finite Models in FOL-Based Crypto-Protocol Verification.- Towards a Type System for Security APIs.- Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption.- How Many Election Officials Does It Take to Change an Election?.
Series Title: SpringerLink: Springer e-Books; Lecture Notes in Computer Science, 5511.
Responsibility: edited by Pierpaolo Degano, Luca Viganò.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/608613652> # Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
    a schema:CreativeWork, bgn:ComputerFile ;
    library:oclcnum "608613652" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/321871071#Place/berlin_heidelberg> ; # Berlin, Heidelberg
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh85027654> ; # Coding theory
    schema:about <http://experiment.worldcat.org/entity/work/data/321871071#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://id.loc.gov/authorities/subjects/sh89003285> ; # Computer science
    schema:about <http://id.worldcat.org/fast/872277> ; # Computer network architectures
    schema:about <http://id.worldcat.org/fast/887978> ; # Data structures (Computer science)
    schema:about <http://id.worldcat.org/fast/866237> ; # Coding theory
    schema:about <http://experiment.worldcat.org/entity/work/data/321871071#Topic/computer_science> ; # Computer Science
    schema:about <http://dewey.info/class/005.82/> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh85029534> ; # Computer software
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://id.loc.gov/authorities/subjects/sh86007468> ; # Computer network architectures
    schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
    schema:about <http://id.worldcat.org/fast/872527> ; # Computer software
    schema:author <http://experiment.worldcat.org/entity/work/data/321871071#Person/vigano_luca> ; # Luca Viganò
    schema:author <http://experiment.worldcat.org/entity/work/data/321871071#Person/degano_pierpaolo> ; # Pierpaolo Degano
    schema:bookEdition "Online-ausg." ;
    schema:datePublished "2009" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/321871071> ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/321871071#Series/lecture_notes_in_computer_science> ; # Lecture Notes in Computer Science ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/321871071#Series/springerlink_springer_e_books> ; # SpringerLink: Springer e-Books
    schema:isSimilarTo <http://worldcat.org/entity/work/data/321871071#CreativeWork/foundations_and_applications_of_security_analysis> ;
    schema:name "Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers" ;
    schema:productID "608613652" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/608613652#PublicationEvent/berlin_heidelberg_springer_berlin_heidelberg_2009> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/321871071#Agent/springer_berlin_heidelberg> ; # Springer Berlin Heidelberg
    schema:url <http://www.springerlink.com/content/978-3-642-03459-6> ;
    schema:url <http://nbn-resolving.de/urn:nbn:de:1111-20170905532> ;
    schema:url <http://d-nb.info/1139257854/34> ;
    schema:url <http://dx.doi.org/10.1007/978-3-642-03459-6> ;
    schema:workExample <http://worldcat.org/isbn/9783642034589> ;
    schema:workExample <http://worldcat.org/isbn/9783642034596> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-642-03459-6> ;
    umbel:isLike <http://d-nb.info/1139257854> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/608613652> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/321871071#Agent/springer_berlin_heidelberg> # Springer Berlin Heidelberg
    a bgn:Agent ;
    schema:name "Springer Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/321871071#Person/degano_pierpaolo> # Pierpaolo Degano
    a schema:Person ;
    schema:familyName "Degano" ;
    schema:givenName "Pierpaolo" ;
    schema:name "Pierpaolo Degano" ;
    .

<http://experiment.worldcat.org/entity/work/data/321871071#Person/vigano_luca> # Luca Viganò
    a schema:Person ;
    schema:familyName "Viganò" ;
    schema:givenName "Luca" ;
    schema:name "Luca Viganò" ;
    .

<http://experiment.worldcat.org/entity/work/data/321871071#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
    schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/321871071#Series/lecture_notes_in_computer_science> # Lecture Notes in Computer Science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/608613652> ; # Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
    schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/321871071#Series/springerlink_springer_e_books> # SpringerLink: Springer e-Books
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/608613652> ; # Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
    schema:name "SpringerLink: Springer e-Books" ;
    .

<http://experiment.worldcat.org/entity/work/data/321871071#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks" ;
    .

<http://experiment.worldcat.org/entity/work/data/321871071#Topic/computer_science> # Computer Science
    a schema:Intangible ;
    schema:name "Computer Science" ;
    .

<http://id.loc.gov/authorities/subjects/sh85027654> # Coding theory
    a schema:Intangible ;
    schema:name "Coding theory" ;
    .

<http://id.loc.gov/authorities/subjects/sh85029534> # Computer software
    a schema:Intangible ;
    schema:name "Computer software" ;
    .

<http://id.loc.gov/authorities/subjects/sh86007468> # Computer network architectures
    a schema:Intangible ;
    schema:name "Computer network architectures" ;
    .

<http://id.loc.gov/authorities/subjects/sh89003285> # Computer science
    a schema:Intangible ;
    schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/866237> # Coding theory
    a schema:Intangible ;
    schema:name "Coding theory" ;
    .

<http://id.worldcat.org/fast/872277> # Computer network architectures
    a schema:Intangible ;
    schema:name "Computer network architectures" ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
    schema:name "Computer science" ;
    .

<http://id.worldcat.org/fast/872527> # Computer software
    a schema:Intangible ;
    schema:name "Computer software" ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)" ;
    .

<http://id.worldcat.org/fast/887978> # Data structures (Computer science)
    a schema:Intangible ;
    schema:name "Data structures (Computer science)" ;
    .

<http://worldcat.org/entity/work/data/321871071#CreativeWork/foundations_and_applications_of_security_analysis>
    a schema:CreativeWork ;
    rdfs:label "Foundations and applications of security analysis." ;
    schema:description "Erscheint auch als" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/608613652> ; # Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
    .

<http://worldcat.org/isbn/9783642034589>
    a schema:ProductModel ;
    schema:isbn "3642034586" ;
    schema:isbn "9783642034589" ;
    .

<http://worldcat.org/isbn/9783642034596>
    a schema:ProductModel ;
    schema:isbn "3642034594" ;
    schema:isbn "9783642034596" ;
    .

<http://www.worldcat.org/title/-/oclc/608613652>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/608613652> ; # Foundations and Applications of Security Analysis Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers
    schema:dateModified "2017-11-14" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.