default search action
FAST 2006: Hamilton, Ontario, Canada
- Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve A. Schneider:
Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers. Lecture Notes in Computer Science 4691, Springer 2007, ISBN 978-3-540-75226-4 - Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti:
Strategic Games on Defense Trees. 1-15 - Johannes Borgström, Olga Grinchtein, Simon Kramer:
Timed Calculus of Cryptographic Communication. 16-30 - Gyrd Brændeland, Ketil Stølen:
A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk. 31-46 - Marion Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré:
Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. 47-64 - Yuxin Deng, Jun Pang, Peng Wu:
Measuring Anonymity with Relative Entropy. 65-79 - Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin:
Formalizing and Analyzing Sender Invariance. 80-95 - Karl Krukow, Mogens Nielsen:
From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust. 96-111 - Ilaria Matteucci:
A Tool for the Synthesis of Controller Programs. 112-126 - Christian W. Probst, René Rydhof Hansen, Flemming Nielson:
Where Can an Insider Attack? 127-142 - Fredrik Seehusen, Ketil Stølen:
Maintaining Information Flow Security Under Refinement and Transformation. 143-157 - Ludwig Seitz, Erik Rissanen, Babak Sadighi Firozabadi:
A Classification of Delegation Schemes for Attribute Authority. 158-169 - Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen:
Program Partitioning Using Dynamic Trust Models. 170-184 - Terkel K. Tolstrup, Flemming Nielson, René Rydhof Hansen:
Locality-Based Security Policies. 185-201 - Kun Wei, James Heather:
A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. 202-219 - Santiago Zanella Béguelin, Gustavo Betarte, Carlos Luna:
A Formal Specification of the MIDP 2.0 Security Model. 220-234 - Ron van der Meyden, Chenyi Zhang:
A Comparison of Semantic Models for Noninterference. 235-249 - Danièle Beauquier, Ruggero Lanotte:
Hiding Information in Multi Level Security Systems. 250-269 - Chunqi Tian, Shihong Zou, Wendong Wang, Shiduan Cheng:
A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. 270-284
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.