


default search action
FOSAD 2000: Bertinoro, Italy
- Riccardo Focardi, Roberto Gorrieri:
Foundations of Security Analysis and Design, Tutorial Lectures [revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, Bertinoro, Italy, September 2000]. Lecture Notes in Computer Science 2171, Springer 2001, ISBN 3-540-42896-8 - Peter Y. A. Ryan
:
Mathematical Models of Computer Security. 1-62 - Paul F. Syverson, Iliano Cervesato:
The Logic of Authentication Protocols. 63-136 - Pierangela Samarati, Sabrina De Capitani di Vimercati:
Access Control: Policies, Models, and Mechanisms. 137-196 - Joshua D. Guttman
:
Security Goals: Packet Trajectories and Strand Spaces. 197-261 - Andrew D. Gordon:
Notes on Nominal Calculi for Security and Mobility. 262-330 - Riccardo Focardi
, Roberto Gorrieri:
Classification of Security Properties (Part I: Information Flow). 331-396

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.