


default search action
FAST 2004: Toulouse, France
- Theodosis Dimitrakos, Fabio Martinelli:
Formal Aspects in Security and Trust: Second IFIP TC1 WG1.7 Workshop on Formal Aspects in Security and Trust (FAST), an event of the 18th IFIP World Computer Congress, August 22-27, 2004, Toulouse, France. IFIP 173, Springer 2005, ISBN 0-387-24050-0 - Mario Bravetti, Nadia Busi, Roberto Gorrieri
, Roberto Lucchi, Gianluigi Zavattaro:
Security Issues in the Tuple-Space Coordination Model. 1-12 - Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina:
Information Flow Analysis for Probabilistic Timed Automata. 13-26 - Lantian Zheng, Andrew C. Myers:
Dynamic Security Labels and Noninterference (Extended Abstract). 27-40 - Jan Cederquist
, Muhammad Torabi Dashti
:
Formal Analysis of a Fair Payment Protocol. 41-54 - Christian Haack, Alan Jeffrey:
Pattern-Matching Spi-Calculus. 55-70 - Laurent Mazaré:
Decidability of Opacity with Non-Atomic Keys. 71-84 - Jerry den Hartog, Erik P. de Vink:
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. 85-98 - James Heather, Jonathan Y. Clark:
Family Secrets. 99-114 - Hristo Koshutanski, Fabio Massacci:
An Interactive Trust Management and Negotiation Scheme. 115-128 - Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland:
Complementing Computational Protocol Analysis with Formal Specifications. 129-144 - Jianqiang Shi, Gregor von Bochmann, Carlisle M. Adams:
A Trust Model with Statistical Foundation. 145-158 - Jeremy W. Bryans
, Maciej Koutny, Peter Y. A. Ryan:
Modelling Dynamic Opacity Using Petri Nets with Silent Actions. 159-172 - Stefano Bistarelli
, Simon N. Foley, Barry O'Sullivan:
Reasoning about Secure Interoperation Using Soft Constraints. 173-186 - Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu:
A Logic for Auditing Accountability in Decentralized Systems. 187-201 - Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège:
A Formal Approach to Specify and Deploy a Network Security Policy. 203-218 - Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot:
Discretionary Overriding of Access Control in the Privilege Calculus. 219-232 - Ali E. Abdallah, Etienne J. Khayat:
A Formal Model for Parameterized Role-Based Access Control. 233-246

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.