


default search action
FAST 2009: Eindhoven, The Netherlands
- Pierpaolo Degano, Joshua D. Guttman:

Formal Aspects in Security and Trust, 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers. Lecture Notes in Computer Science 5983, Springer 2010, ISBN 978-3-642-12458-7
Invited Lecture
- Anindya Banerjee:

Semantics and Enforcement of Expressive Information Flow Policies. 1-3
Trust
- Baptiste Alcalde, Sjouke Mauw

:
An Algebra for Trust Dilution and Trust Fusion. 4-20 - Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielsen:

HMM-Based Trust Model. 21-35 - Florian Eilers, Uwe Nestmann:

Deriving Trust from Experience. 36-50 - Andrew Cirillo, James Riely

:
Reflections on Trust: Trust Assurance by Dynamic Discovery of Static Properties. 51-65
Workflow and Orchestration
- Alessandro Armando

, Serena Elisa Ponta:
Model Checking of Security-Sensitive Business Processes. 66-80
Secure Flow
- Toby C. Murray, Gavin Lowe:

Analysing the Information Flow Properties of Object-Capability Patterns. 81-95 - Jonathan Heusser, Pasquale Malacaria:

Applied Quantitative Information Flow and Statistical Databases. 96-110 - Josef Svenningsson, David Sands:

Specification and Verification of Side Channel Declassification. 111-125 - Rafael Alpízar, Geoffrey Smith:

Secure Information Flow for Distributed Systems. 126-140
Mobility and Deniability
- Sardaouna Hamadou, Catuscia Palamidessi

, Vladimiro Sassone, Ehab ElSalamouny:
Probable Innocence in the Presence of Independent Knowledge. 141-156 - Massimo Merro

, Eleonora Sibilio:
A Calculus of Trustworthy Ad Hoc Networks. 157-172
Protocols 1
- Pascal Lafourcade

, Vanessa Terrade, Sylvain Vigier:
Comparison of Cryptographic Verification Tools Dealing with Algebraic Properties. 173-185 - Ying Zhang, Chenyi Zhang, Jun Pang, Sjouke Mauw

:
Game-Based Verification of Multi-Party Contract Signing Protocols. 186-200 - Liqun Chen

, Mark Ryan
:
Attack, Solution and Verification for Shared Authorisation Data in TCG TPM. 201-216
Protocols 2
- Jay A. McCarthy, Shriram Krishnamurthi

:
Trusted Multiplexing of Cryptographic Protocols. 217-232 - Allaa Kamil, Gavin Lowe:

Specifying and Modelling Secure Channels in Strand Spaces. 233-247
Protocols 3
- Achim D. Brucker

, Sebastian Mödersheim
:
Integrating Automated and Interactive Protocol Verification. 248-262 - Peeter Laud

, Ilja Tsahhirov:
A User Interface for a Game-Based Protocol Verification Tool. 263-278

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














