책 이미지
책 정보
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9783540206934
· 쪽수 : 246쪽
목차
Keynote Talk.- Lifting Reference Monitors from the Kernel.- Invited Talks I.- Authenticity Types for Cryptographic Protocols.- Verifying the SET Protocol: Overview.- Protocol Verification.- Interacting State Machines: A Stateful Approach to Proving Security.- Automatic Approximation for the Verification of Cryptographic Protocols.- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.- Invited Talks II.- Critical Critical Systems.- Analysing Security Protocols.- Analysis of Protocols.- Analysis of Probabilistic Contract Signing.- Security Analysis of (Un-) Fair Non-repudiation Protocols.- Modeling Adversaries in a Logic for Security Protocol Analysis.- Security Modelling and Reasonning.- Secure Self-certified Code for Java.- Z Styles for Security Properties and Modern User Interfaces.- Invited Talks III.- Cryptographic Challenges: The Past and the Future.- TAPS: The Last Few Slides.- Intrusion Detection Systems and Liveness.- Formal Specification for Fast Automatic IDS Training.- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area.- Revisiting Liveness Properties in the Context of Secure Systems.