search for books and compare prices
Tables of Contents for Formal Aspects of Security
Chapter/Section Title
Page #
Page Count
Keynote Talk
Lifting Reference Monitors from the Kernel
1
2
F.B. Schneider
Invited Talks I
Authenticity Types for Cryptographic Protocols
3
1
A. Gordon
Verifying the SET Protocol: Overview
4
11
L.C. Paulson
Protocol Verification
Interacting State Machines: A Stateful Approach to Proving Security
15
18
D. von Oheimb
Automatic Approximation for the Verification of Cryptographic Protocols
33
16
F. Oehl
G. Cece
O. Kouchnarenko
D. Sinclair
Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis
49
13
C. Boyd
K. Viswanathan
Invited Talks II
Critical Critical Systems
62
9
S. Stepney
Analysing Security Protocols
71
10
D. Gollmann
Analysis of Protocols
Analysis of Probabilistic Contract Signing
81
16
G. Norman
V. Shmatikov
Security Analysis of (Un-) Fair Non-repudiation Protocols
97
18
S. Gurgens
C. Rudolph
Modeling Adversaries in a Logic for Security Protocol Analysis
115
18
J. Y. Halpern
R. Pucella
Security Modelling and Reasonning
Secure Self-certified Code for Java
133
19
M. Debbabi
J. Desharnais
M. Fourati
E. Menif
F. Painchaud
N. Tawbi
Z Styles for Security Properties and Modern User Interfaces
152
15
A. Hall
Invited Talks III
Cryptographic Challenges: The Past and the Future
167
16
B. Preneel
TAPS: The Last Few Slides
183
8
E. Cohen
Intrusion Detection Systems and Liveness
Formal Specification for Fast Automatic IDS Training
191
14
A. Durante
R. Di Pietro
L. V. Mancini
Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area
205
16
G. T. Rohrmair
G. Lowe
Revisiting Liveness Properties in the Context of Secure Systems
221
18
F. C. Gartner
Author Index
239