Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Foundations of security analysis and design V : FOSAD 2007/2008/2009 tutorial lectures (LNCS 5705)
Aldini A., Barthe G., Gorrieri R. Springer-Verlag, New York, NY,2009.Type:Divisible Book
Date Reviewed: Mar 10 2010

This is a compilation of selected tutorial papers from the 2007 to 2009 Foundations of Security Analysis and Design (FOSAD) schools. In the first paper, Escobar, Meadows, and Meseguer describe the Maude-NRL protocol analyzer (Maude-NPA), a model-checking tool. Many researchers use formal methods to analyze cryptographic protocols--an approach that emphasizes automated machine specification and analysis--so this tool is very relevant.

The sixth paper in this collection, “The open-source fixed-point model checker for symbolic analysis of security protocols,” is closely related to the first paper. Mödersheim and Luca Viganò describe the on-the-fly model checker (OFMC), another model-checking tool for symbolic cryptographic protocol analysis. Also related, Rustan et al.’s paper describes Chalice, a language and program-verifier tool.

In the second paper, Barthe and Kunz briefly introduce certificate translation, the underlying principles of proof-carrying code, and the source programming language.

In the next paper, Chadwick introduces federated identity management (FIM), a topic that will interest both researchers and practitioners. With FIM, organizations can securely share confidential user identities. The paper briefly introduces the seven laws of identity and some of the privacy issues associated with identity management systems, and uses two early FIM systems as case studies. As an example, Chadwick describes the key drivers that most probably result in a slow adoption (or scaling back) of the two early FIM systems. He also describes two existing FIM systems in some detail.

Jacobs and Pieters outline the history of the Netherlands’ traditional and electronic voting system and its underlying principles and techniques. They attempt to explain why e-voting has failed to take off in the Netherlands, despite the country being an early adopter. The other four papers in the book cover topics such as access and authorization control, and wireless security.

This collection is an excellent resource for computer science (CS) graduate students, scholars, and practitioners interested in security-related research. Furthermore, it provides up-to-date citations for further study. Not surprisingly, the reader is expected to possess a strong mathematics background.

The organization of the book could use some improvement. The book is divided into three main parts: “FOSAD 2007,” “FOSAD 2008,” and “FOSAD 2009.” It would be more helpful for the reader if related topics were compiled together, rather than grouped by year. For example, Part 1 should include all the papers on cryptographic protocol analysis, even though they are from different FOSAD schools.

Reviewer:  Kim-Kwang Raymond Choo Review #: CR137790 (1101-0002)
Bookmark and Share
 
Security and Protection (C.2.0 ... )
 
 
Certification And Testing (G.4 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Wireless Communication (C.2.1 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
Introduction to data security and controls (2nd ed.)
Edward R. I., QED Information Sciences, Inc., Wellesley, MA, 1991. Type: Book (9780894353864)
Aug 1 1992
Security for computer networks: an introduction to data security in teleprocessing and electronic funds transfer
Davies D., Price W., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471900634)
Oct 1 1985
The development and proof of a formal specification for a multilevel secure system
Glasgow J., Macewen G. ACM Transactions on Computer Systems 5(2): 151-184, 1987. Type: Article
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy