Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan. The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing from 115 submissions. The papers cover theory, practice, applications, and experiences related to secure software.
Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan. The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing from 115 submissions. The papers cover theory, practice, applications, and experiences related to secure software.
Produktdetails
Produktdetails
Theoretical Computer Science and General Issues 4435
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
ASIAN'2006.- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.- A Symbolic Intruder Model for Hash-Collision Attacks.- A Denotational Approach to Scope-Based Compensable Flow Language for Web Service.- Certificateless Authenticated Two-Party Key Agreement Protocols.- FORM : A Federated Rights Expression Model for Open DRM Frameworks.- A Method of Safety Analysis for Runtime Code Update.- Automata-Based Confidentiality Monitoring.- Efficient and Practical Control Flow Monitoring for Program Security.- Modular Formalization of Reactive Modules in COQ.- Closing Internal Timing Channels by Transformation.- Responsiveness in Process Calculi.- Normal Proofs in Intruder Theories.- Breaking and Fixing Public-Key Kerberos.- Computational Soundness of Formal Indistinguishability and Static Equivalence.- Secrecy Analysis in Protocol Composition Logic.- A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations.- On Completeness of Logical Relations for Monadic Types.- A Spatial Logical Characterisation of Context Bisimulation.- Information Hiding in the Join Calculus.- Modeling Urgency in Component-Based Real-Time Systems.- Maintaining Data Consistency of XML Databases Using Verification Techniques.- An Operational Semantics of Program Dependence Graphs for Unstructured Programs.- Combination of Abstractions in the ASTRÉE Static Analyzer.- Proving Noninterference by a Fully Complete Translation to the Simply Typed ?-Calculus.- Formalization of CTL* in Calculus of Inductive Constructions.- Inferring Disjunctive Postconditions.- An Approach to Formal Verification of Arithmetic Functions in Assembly.
ASIAN'2006.- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.- A Symbolic Intruder Model for Hash-Collision Attacks.- A Denotational Approach to Scope-Based Compensable Flow Language for Web Service.- Certificateless Authenticated Two-Party Key Agreement Protocols.- FORM : A Federated Rights Expression Model for Open DRM Frameworks.- A Method of Safety Analysis for Runtime Code Update.- Automata-Based Confidentiality Monitoring.- Efficient and Practical Control Flow Monitoring for Program Security.- Modular Formalization of Reactive Modules in COQ.- Closing Internal Timing Channels by Transformation.- Responsiveness in Process Calculi.- Normal Proofs in Intruder Theories.- Breaking and Fixing Public-Key Kerberos.- Computational Soundness of Formal Indistinguishability and Static Equivalence.- Secrecy Analysis in Protocol Composition Logic.- A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations.- On Completeness of Logical Relations for Monadic Types.- A Spatial Logical Characterisation of Context Bisimulation.- Information Hiding in the Join Calculus.- Modeling Urgency in Component-Based Real-Time Systems.- Maintaining Data Consistency of XML Databases Using Verification Techniques.- An Operational Semantics of Program Dependence Graphs for Unstructured Programs.- Combination of Abstractions in the ASTRÉE Static Analyzer.- Proving Noninterference by a Fully Complete Translation to the Simply Typed ?-Calculus.- Formalization of CTL* in Calculus of Inductive Constructions.- Inferring Disjunctive Postconditions.- An Approach to Formal Verification of Arithmetic Functions in Assembly.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826