Skip to main content
  • Conference proceedings
  • © 2012

Theory of Security and Applications

Joint Workshop, TOSCA 2011, Saarbrücken, Germany,March 31-April 1, 2011, Revised Selected Papers

  • Fast-track conference proceedings
  • State-of-the-art research
  • Up-to-date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6993)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): TOSCA: Joint Workshop on Theory of Security and Applications

Conference proceedings info: TOSCA 2011.

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (12 papers)

  1. Front Matter

  2. Union and Intersection Types for Secure Protocol Implementations

    • Michael Backes, Cătălin Hriţcu, Matteo Maffei
    Pages 1-28
  3. Secure Composition of Protocols

    • Véronique Cortier
    Pages 29-32
  4. G2C: Cryptographic Protocols from Goal-Driven Specifications

    • Michael Backes, Matteo Maffei, Kim Pecina, Raphael M. Reischuk
    Pages 57-77
  5. Modeling Long-Term Signature Validation for Resolution of Dispute

    • Moez Ben MBarka, Francine Krief, Olivier Ly
    Pages 78-97
  6. Formal Analysis of Privacy for Anonymous Location Based Services

    • Morten Dahl, Stéphanie Delaune, Graham Steel
    Pages 98-112
  7. Formal Analysis of the EMV Protocol Suite

    • Joeri de Ruiter, Erik Poll
    Pages 113-129
  8. Security Goals and Protocol Transformations

    • Joshua D. Guttman
    Pages 130-147
  9. Model-Checking Secure Information Flow for Multi-threaded Programs

    • Marieke Huisman, Henri-Charles Blondeel
    Pages 148-165
  10. Multiple Congruence Relations, First-Order Theories on Terms, and the Frames of the Applied Pi-Calculus

    • Florent Jacquemard, Étienne Lozes, Ralf Treinen, Jules Villard
    Pages 166-185
  11. Automated Code Injection Prevention for Web Applications

    • Zhengqin Luo, Tamara Rezk, Manuel Serrano
    Pages 186-204
  12. Back Matter

About this book

This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application.

Editors and Affiliations

  • Richard Petersen Pladsm, DTU Informatics, kgs. Lynby, Denmark

    Sebastian Mödersheim

  • INRIA, Palaiseau Cedex, France

    Catuscia Palamidessi

Bibliographic Information

Buy it now

Buying options

eBook USD 54.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access