default search action
FAST 2009: Eindhoven, The Netherlands
- Pierpaolo Degano, Joshua D. Guttman:
Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5983, Springer 2010, ISBN 978-3-642-12458-7
Invited Lecture
- Anindya Banerjee:
Semantics and Enforcement of Expressive Information Flow Policies. 1-3
Trust
- Baptiste Alcalde, Sjouke Mauw:
An Algebra for Trust Dilution and Trust Fusion. 4-20 - Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielsen:
HMM-Based Trust Model. 21-35 - Florian Eilers, Uwe Nestmann:
Deriving Trust from Experience. 36-50 - Andrew Cirillo, James Riely:
Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties. 51-65
Workflow and Orchestration
- Alessandro Armando, Serena Elisa Ponta:
Model Checking of Security-Sensitive Business Processes. 66-80
Secure Flow
- Toby C. Murray, Gavin Lowe:
Analysing the Information Flow Properties of Object-Capability Patterns. 81-95 - Jonathan Heusser, Pasquale Malacaria:
Applied Quantitative Information Flow and Statistical Databases. 96-110 - Josef Svenningsson, David Sands:
Specification and Verification of Side Channel Declassification. 111-125 - Rafael Alpízar, Geoffrey Smith:
Secure Information Flow for Distributed Systems. 126-140
Mobility and Deniability
- Sardaouna Hamadou, Catuscia Palamidessi, Vladimiro Sassone, Ehab ElSalamouny:
Probable Innocence in the Presence of Independent Knowledge. 141-156 - Massimo Merro, Eleonora Sibilio:
A Calculus of Trustworthy Ad Hoc Networks. 157-172
Protocols 1
- Pascal Lafourcade, Vanessa Terrade, Sylvain Vigier:
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties. 173-185 - Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw:
Game-Based Verification of Multi-Party Contract Signing Protocols. 186-200 - Liqun Chen, Mark Ryan:
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. 201-216
Protocols 2
- Jay A. McCarthy, Shriram Krishnamurthi:
Trusted Multiplexing of Cryptographic Protocols. 217-232 - Allaa Kamil, Gavin Lowe:
Specifying and Modelling Secure Channels in Strand Spaces. 233-247
Protocols 3
- Achim D. Brucker, Sebastian Mödersheim:
Integrating Automated and Interactive Protocol Verification. 248-262 - Peeter Laud, Ilja Tsahhirov:
A User Interface for a Game-Based Protocol Verification Tool. 263-278
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.