Foundations of Security Analysis and Design |
FOSAD 2007 / Part I: |
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties / Santiago Escobar ; Catherine Meadows ; José Meseguer |
FOSAD 2008 / Part II: |
An Introduction to Certificate Translation / Gilles Barthe ; C&eacue;sar Kunz |
Federated Identity Management / David W. Chadwick |
Electronic Voting in the Netherlands: From Early Adoption to Early Abolishment / Bart Jacobs ; Walter Pieters |
FOSAD 2009 / Part III: |
Logic in Access Control (Tutorial Notes) / Martín Abadi |
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols / Sebastian Mödersheim ; Luca Vigan` |
Verification of Concurrent Programs with Chalice / K. Rustan ; M. Leino ; Peter Müller ; Jan Smans |
Certified Static Analysis by Abstract Interpretation / Frédéric Besson ; David Cachera ; Thomas Jensen ; David Pichardie |
Resource Usage Analysis and Its Application to Resource Certification / Elvira Albert ; Puri Arenas ; Samir Genaim ; Germán Puebla ; Damiano Zanardini |
Analysis of Security Threats, Requirements, Technologies and Standards in Wireless Sensor Networks / Javier Lopez ; Rodrigo Roman ; Cristina Alcaraz |
Author Index |
Foundations of Security Analysis and Design |
FOSAD 2007 / Part I: |
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties / Santiago Escobar ; Catherine Meadows ; José Meseguer |