Formal Correctness of Security Protocols (Record no. 251465)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03533nam a22005895i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-68136-6 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20160614135734.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 100301s2007 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540681366 |
-- | 978-3-540-68136-6 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/978-3-540-68136-6 |
Source of number or code | doi |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | Alfaisal Main Library |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5105.5-5105.9 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | UKN |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM075000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 004.6 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Bella, Giampaolo. |
Relator term | author. |
245 10 - TITLE STATEMENT | |
Title | Formal Correctness of Security Protocols |
Medium | [electronic resource] : |
Remainder of title | With 62 Figures and 4 Tables / |
Statement of responsibility, etc | by Giampaolo Bella. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE STATEMENTS | |
Place of production, publication, distribution, manufacture | Berlin, Heidelberg : |
Name of producer, publisher, distributor, manufacturer | Springer Berlin Heidelberg, |
Date of production, publication, distribution, manufacture | 2007. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XX, 274 p. 64 illus. |
Other physical details | online resource. |
336 ## - CONTENT TYPE | |
Content Type Term | text |
Content Type Code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media Type Term | computer |
Media Type Code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier Type Term | online resource |
Carrier Type Code | cr |
Source | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Information Security and Cryptography, Texts and Monographs, |
International Standard Serial Number | 1619-7100 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | The Analysis of Security Protocols -- The Inductive Method -- Verifying the Protocol Goals -- The Principle of Goal Availability -- Modelling Timestamping and Verifying a Classical Protocol -- Verifying a Deployed Protocol -- Modelling Agents’ Knowledge of Messages -- Verifying Another Deployed Protocol -- Modelling Smartcards -- Verifying a Smartcard Protocol -- Modelling Accountability -- Verifying Two Accountability Protocols -- Conclusions. |
520 ## - SUMMARY, ETC. | |
Summary, etc | Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis, the Inductive Method in the theorem prover Isabelle, turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating. This book will benefit researchers and graduate students in the fields of formal methods, information security, inductive methods, and networking. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer science. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer communication systems. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data structures (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Mathematical logic. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Artificial intelligence. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electrical engineering. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Science. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Computer Communication Networks. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Mathematical Logic and Formal Languages. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data Structures, Cryptology and Information Theory. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Systems and Data Security. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Artificial Intelligence (incl. Robotics). |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Communications Engineering, Networks. |
655 #7 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
Source of term | local |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer eBooks |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783540681342 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Information Security and Cryptography, Texts and Monographs, |
-- | 1619-7100 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-540-68136-6">http://ezproxy.alfaisal.edu/login?url=http://dx.doi.org/10.1007/978-3-540-68136-6</a> |
912 ## - | |
-- | ZDB-2-SCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Library of Congress Classification |
Koha item type | eBooks |
No items available.