Okada / Satoh | Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues | Buch | 978-3-540-77504-1 | sack.de

Buch, Englisch, 364 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 587 g

Reihe: Theoretical Computer Science and General Issues

Okada / Satoh

Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues

11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers
Erscheinungsjahr 2008
ISBN: 978-3-540-77504-1
Verlag: Springer

11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers

Buch, Englisch, 364 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 587 g

Reihe: Theoretical Computer Science and General Issues

ISBN: 978-3-540-77504-1
Verlag: Springer


Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan. The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing from 115 submissions. The papers cover theory, practice, applications, and experiences related to secure software.

Okada / Satoh Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues jetzt bestellen!

Zielgruppe


Research


Autoren/Hrsg.


Weitere Infos & Material


ASIAN’2006.- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.- A Symbolic Intruder Model for Hash-Collision Attacks.- A Denotational Approach to Scope-Based Compensable Flow Language for Web Service.- Certificateless Authenticated Two-Party Key Agreement Protocols.- FORM: A Federated Rights Expression Model for Open DRM Frameworks.- A Method of Safety Analysis for Runtime Code Update.- Automata-Based Confidentiality Monitoring.- Efficient and Practical Control Flow Monitoring for Program Security.- Modular Formalization of Reactive Modules in COQ.- Closing Internal Timing Channels by Transformation.- Responsiveness in Process Calculi.- Normal Proofs in Intruder Theories.- Breaking and Fixing Public-Key Kerberos.- Computational Soundness of Formal Indistinguishability and Static Equivalence.- Secrecy Analysis in Protocol Composition Logic.- A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations.- On Completeness of Logical Relations for Monadic Types.- A Spatial Logical Characterisation of Context Bisimulation.- Information Hiding in the Join Calculus.- Modeling Urgency in Component-Based Real-Time Systems.- Maintaining Data Consistency of XML Databases Using Verification Techniques.- An Operational Semantics of Program Dependence Graphs for Unstructured Programs.- Combination of Abstractions in the ASTRÉE Static Analyzer.- Proving Noninterference by a Fully Complete Translation to the Simply Typed ?-Calculus.- Formalization of CTL* in Calculus of Inductive Constructions.- Inferring Disjunctive Postconditions.- An Approach to Formal Verification of Arithmetic Functions in Assembly.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.