Foundations of security analysis and design : tutorial lectures / edited by Riccardo Focardi and Robert Gorrieri.
Contributor(s): Focardi, Riccardo
| Gorrieri, Roberto
| International School on Foundations of Security Analysis and Design (2000 : Bertinoro, Italy).
Material type: ![materialTypeLabel](/opac-tmpl/lib/famfamfam/BK.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
![](/opac-tmpl/bootstrap/images/filefind.png)
Item type | Current library | Call number | Copy number | Status | Date due | Barcode | Item holds |
---|---|---|---|---|---|---|---|
General Lending | MTU Bishopstown Library Lending | 005.8 (Browse shelf(Opens below)) | 1 | Available | 00092305 |
Enhanced descriptions from Syndetics:
Security is a rapidly growing area of computer science, with direct and increasing relevance to real life applications such as Internet transactions, electronic commerce, information protection, network and systems integrity, etc. This volume presents thoroughly revised versions of lectures given by leading security researchers during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design, FOSAD 2000, held in Bertinoro, Italy in September. Mathematical Models of Computer Security (Peter Y.A. Ryan); The Logic of Authentication Protocols (Paul Syversen and Iliano Cervesato); Access Control: Policies, Models, and Mechanisms (Pierangela Samarati and Sabrina de Capitani di Vimercati); Security Goals: Packet Trajectories and Strand Spaces (Joshua D. Guttman); Notes on Nominal Calculi for Security and Mobility (Andrew D. Gordon); Classification of Security Properties (Riccardo Focardi and Roberto Gorrieri).
Lectures presented at the International School on Foundations of Security Analysis and Design, Sept. 18-30, 2000, Bertinoro, Italy.
Includes bibliographical references and index.
Mathematical models of computer security / Peter Y. A. Ryan -- The logic of authentication protocols / Paul Syverson and Iliano Cervesato -- Access control: policies, models and mechanisms / Pierangela Samarati and Sabrina de Capitani di Vimercati -- Security goals: Packet trajectories and strand spaces / Joshua D. Guttman -- Notes on nominal calculi for security and mobility / Andrew D. Gordon -- Classification of security properties (Part I: Information Flow) / Riccardo Focardi and Roberto Gorrieri.
Table of contents provided by Syndetics
- Mathematical Models of Computer Security (p. 1)
- The Logic of Authentication Protocols (p. 63)
- Access Control: Policies, Models, and Mechanisms (p. 137)
- Security Goals: Packet Trajectories and Strand Spaces (p. 197)
- Notes on Nominal Calculi for Security and Mobility (p. 262)
- Classification of Security Properties (lPart IInformation Flow) (p. 331)
- Author Index (p. 397)