Foundations and Applications of Security Analysis

Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers

  • Pierpaolo Degano
  • Luca Viganò
Conference proceedings ARSPA-WITS 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5511)

Table of contents

  1. Front Matter
  2. Adedayo O. Adetoye, Atta Badii
    Pages 1-17
  3. Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna
    Pages 34-51
  4. Massimo Bartoletti
    Pages 52-69
  5. Chiara Bodei, Linda Brodo, Roberto Bruni
    Pages 70-87
  6. Niklas Broberg, David Sands
    Pages 88-91
  7. Sibylle Fröschle, Graham Steel
    Pages 92-106
  8. Joshua D. Guttman
    Pages 107-123
  9. Jorge L. Hernandez-Ardieta, Ana I. Gonzalez-Tablas, Benjamin Ramos
    Pages 124-137
  10. Jan Jürjens, Tjark Weber
    Pages 155-172
  11. Gavin Keighren, David Aspinall, Graham Steel
    Pages 173-192
  12. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-conference
proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009.

The 12 revised full papers presented together with 2 invited talks were
carefully reviewed and selected from 27 submissions. The papers feature

topics including formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, the modeling of information flow and its application to confidentiality policies, system composition and covert channel analysis.


access control automated reasoning code cryptographic protocol cryptographic protocols formal specification formal validation imperfect security information key management policy models security APIs security protocols verification

Editors and affiliations

  • Pierpaolo Degano
    • 1
  • Luca Viganò
    • 2
  1. 1.Dipartimento di InformaticaUniversità di PisaPisaItaly
  2. 2.Dipartimento di InformaticaUniversità di VeronaVeronaItaly

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-03458-9
  • Online ISBN 978-3-642-03459-6
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Finance, Business & Banking
IT & Software