Formal aspects of security : first International Conference, FASec 2002 : London, UK, December 16-18, 2002 : revised papers

Keynote Talk.- Lifting Reference Monitors from the Kernel.- Invited Talks I.- Authenticity Types for Cryptographic Protocols.- Verifying the SET Protocol: Overview.- Protocol Verification.- Interacting State Machines: A Stateful Approach to Proving Security.- Automatic Approximation for the Verification of Cryptographic Protocols.- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis.- Invited Talks II.- Critical Critical Systems.- Analysing Security Protocols.- Analysis of Protocols.- Analysis of Probabilistic Contract Signing.- Security Analysis of (Un-) Fair Non-repudiation Protocols.- Modeling Adversaries in a Logic for Security Protocol Analysis.- Security Modelling and Reasonning.- Secure Self-certified Code for Java.- Z Styles for Security Properties and Modern User Interfaces.- Invited Talks III.- Cryptographic Challenges: The Past and the Future.- TAPS: The Last Few Slides.- Intrusion Detection Systems and Liveness.- Formal Specification for Fast Automatic IDS Training.- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area.- Revisiting Liveness Properties in the Context of Secure Systems.