Advances in Computer Science – ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 4435

ISBN: 3540775048, 9783540775041

Size: 4 MB (4314824 bytes)

Pages: 364/391

File format:

Language:

Publishing Year:

Category: Tags: , , , , , ,

Akira Matsunaga, Tsutomu Matsumoto (auth.), Mitsu Okada, Ichiro Satoh (eds.)3540775048, 9783540775041

This book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan, in December 2006.The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing and revision from 115 submissions. The papers cover all aspects of theory, practice, applications, and experiences related to secure software and feature new ways to apply theoretical and practical techniques in secure software analysis, design, development, and operation.

Table of contents :
Front Matter….Pages –
Security Evaluation of a Type of Table-Network Implementation of Block Ciphers….Pages 1-12
A Symbolic Intruder Model for Hash-Collision Attacks….Pages 13-27
A Denotational Approach to Scope-Based Compensable Flow Language for Web Service….Pages 28-36
Certificateless Authenticated Two-Party Key Agreement Protocols….Pages 37-44
FORM : A Federated Rights Expression Model for Open DRM Frameworks….Pages 45-59
A Method of Safety Analysis for Runtime Code Update….Pages 60-74
Automata-Based Confidentiality Monitoring….Pages 75-89
Efficient and Practical Control Flow Monitoring for Program Security….Pages 90-104
Modular Formalization of Reactive Modules in COQ….Pages 105-119
Closing Internal Timing Channels by Transformation….Pages 120-135
Responsiveness in Process Calculi….Pages 136-150
Normal Proofs in Intruder Theories….Pages 151-166
Breaking and Fixing Public-Key Kerberos….Pages 167-181
Computational Soundness of Formal Indistinguishability and Static Equivalence….Pages 182-196
Secrecy Analysis in Protocol Composition Logic….Pages 197-213
A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations….Pages 214-222
On Completeness of Logical Relations for Monadic Types….Pages 223-230
A Spatial Logical Characterisation of Context Bisimulation….Pages 231-239
Information Hiding in the Join Calculus….Pages 240-247
Modeling Urgency in Component-Based Real-Time Systems….Pages 248-255
Maintaining Data Consistency of XML Databases Using Verification Techniques….Pages 256-263
An Operational Semantics of Program Dependence Graphs for Unstructured Programs….Pages 264-271
Combination of Abstractions in the ASTRÉE Static Analyzer….Pages 272-300
Proving Noninterference by a Fully Complete Translation to the Simply Typed λ -Calculus….Pages 301-315
Formalization of CTL * in Calculus of Inductive Constructions….Pages 316-330
Inferring Disjunctive Postconditions….Pages 331-345
An Approach to Formal Verification of Arithmetic Functions in Assembly….Pages 346-360
Back Matter….Pages –

Reviews

There are no reviews yet.

Be the first to review “Advances in Computer Science – ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers”
Shopping Cart
Scroll to Top