Logo - springer
Slogan - springer

Computer Science - Communication Networks | Formal Aspects in Security and Trust - Third International Workshop, FAST 2005, Newcastle upon

Formal Aspects in Security and Trust

Third International Workshop, FAST 2005, Newcastle upon Tyne, UK, July 18-19, 2005, Revised Selected Papers

Dimitrakos, T., Martinelli, F., Ryan, P.Y.A., Schneider, S. (Eds.)

2006, X, 259 p. Also available online.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


(net) price for USA

ISBN 978-3-540-32629-8

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-540-32628-1

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

  • About this book

This book constitutes the thoroughly refereed post-proceedings of the Third International Workshop on Formal Aspects in Security and Trust, FAST 2005, held in Newcastle upon Tyne, UK in July 2005.

The 17 revised papers presented together with the extended abstract of 1 invited paper were carefully reviewed and selected from 37 submissions. The papers focus on formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and ID issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, GRID security, security risk assessment, and case studies.

Content Level » Research

Keywords » information - privacy - security - tools - trust - ubiquitous computing

Related subjects » Communication Networks - Database Management & Information Retrieval - General Issues - Security and Cryptology - Software Engineering

Table of contents 

Voting Technologies and Trust.- On the Formal Analyses of the Zhou-Gollmann Non-repudiation Protocol.- Formal Reasoning About a Specification-Based Intrusion Detection for Dynamic Auto-configuration Protocols in Ad Hoc Networks.- A Formal Approach for Reasoning About a Class of Diffie-Hellman Protocols.- Eliminating Implicit Information Leaks by Transformational Typing and Unification.- Abstract Interpretation to Check Secure Information Flow in Programs with Input-Output Security Annotations.- Opacity Generalised to Transition Systems.- Unifying Decidability Results on Protection Systems Using Simulations.- Proof Obligations Preserving Compilation.- A Logic for Analysing Subterfuge in Delegation Chains.- Probable Innocence Revisited.- Relative Trustworthiness.- Secure Untrusted Binaries — Provably!.- Normative Specification: A Tool for Trust and Security.- Type-Based Distributed Access Control vs. Untyped Attackers.- A Security Management Information Model Derivation Framework: From Goals to Configurations.- On Anonymity with Identity Escrow.- Towards Verification of Timed Non-repudiation Protocols.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.