Formal Aspects of Security and Trust

7th International Workshop, FAST 2010, Pisa, Italy, September 16-17, 2010. Revised Selected Papers

  • Pierpaolo Degano
  • Sandro Etalle
  • Joshua Guttman
Conference proceedings FAST 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6561)

Table of contents

  1. Front Matter
  2. Max Kanovich, Tajana Ban Kirigin, Vivek Nigam, Andre Scedrov
    Pages 18-33
  3. Bruno Conchinha, David Basin, Carlos Caleiro
    Pages 34-49
  4. Allaa Kamil, Gavin Lowe
    Pages 50-64
  5. Mana Taghdiri, Gregor Snelting, Carsten Sinz
    Pages 65-79
  6. Barbara Kordy, Sjouke Mauw, Saša Radomirović, Patrick Schweitzer
    Pages 80-95
  7. Sibylle Fröschle, Nils Sommer
    Pages 96-110
  8. Stéphanie Delaune, Steve Kremer, Mark D. Ryan, Graham Steel
    Pages 111-125
  9. Meilof Veeningen, Benne de Weger, Nicola Zannone
    Pages 126-140
  10. Tim Muller
    Pages 141-156
  11. Clément Hurlin, Hélène Kirchner
    Pages 157-175
  12. Raphael Khoury, Nadia Tawbi
    Pages 176-190
  13. Francesco Ballardin, Massimo Merro
    Pages 206-222
  14. Naipeng Dong, Hugo Jonker, Jun Pang
    Pages 223-238
  15. Back Matter

About these proceedings


This book constitutes the thoroughly refereed post-proceedings of the 7th International Workshop on Formal Aspects of Security and Trust, FAST 2010, held as part of the 8th IEEE International Conference on Software Engineering and Formal Methods, SEFM 2010 in Pisa, Italy in September 2010. The 14 revised full papers presented together with one invited paper were carefully reviewed and selected from 42 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, web service security/trust/privacy, grid security, security risk assessment, and case studies.


access control attack-defense trees auction protocols authentication cryptographic enforcement decision procedures information flow analysis message deducibility network security protocols secure communication channels security policies trust networks trust semantics

Editors and affiliations

  • Pierpaolo Degano
    • 1
  • Sandro Etalle
    • 2
  • Joshua Guttman
    • 3
  1. 1.Dipartimento di InformaticaUniversità di PisaPisaItaly
  2. 2.Faculty of Mathematics and Computer ScienceTechnical University of EindhovenEindhovenThe Netherlands
  3. 3.Computer ScienceWorcester Polytechnic InstituteWorcesterUSA

Bibliographic information

Industry Sectors
Materials & Steel
Finance, Business & Banking
IT & Software
Consumer Packaged Goods
Energy, Utilities & Environment
Oil, Gas & Geosciences