Narrow your search

Library

KU Leuven (15)

Odisee (15)

Thomas More Kempen (15)

Thomas More Mechelen (15)

ULB (15)

ULiège (15)

VIVES (15)

UCLL (13)

AP (11)

KDG (11)

More...

Resource type

book (26)

digital (11)


Language

English (34)


Year
From To Submit

2024 (2)

2016 (3)

2015 (2)

2014 (4)

2011 (3)

More...
Listing 1 - 10 of 34 << page
of 4
>>
Sort by
Foundations of security analysis and design III : FOSAD 2004/2005 Tutorial Lectures
Author:
ISSN: 03029743 ISBN: 9783540289555 3540289550 3540319360 Year: 2005 Volume: 3655 Publisher: Berlin: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The “Int- national School on Foundations of Security Analysis and Design” (FOSAD, see http://www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea,especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http://www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer’s LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005.

Keywords

Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses --- Security measures --- Congresses. --- Congrès --- Sécurité --- Mesures --- Computer Communication Networks --- Computer Science --- Data encryption (Computer science) --- Information Systems --- Logic design --- Operating systems (Computers) --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Computer security. --- Data encryption (Computer science). --- Computer logic. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Operating Systems. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Logics and Meanings of Programs. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer science logic --- Logic, Symbolic and mathematical --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Operating systems --- Distributed processing --- Information Systems. --- Logic design. --- Cryptology. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Data protection. --- Cryptography. --- Computer networks. --- Data and Information Security. --- IT Operations. --- Computer Science Logic and Foundations of Programming. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data


Book
Software Engineering and Formal Methods. SEFM 2023 Collocated Workshops : CIFMA 2023 and OpenCERT 2023, Eindhoven, The Netherlands, November 6–10, 2023, Revised Selected Papers
Author:
ISBN: 9783031660214 Year: 2024 Publisher: Cham : Springer Nature Switzerland : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the papers of two workshops which were held in conjunction with the 21st International Workshop on Software Engineering and Formal Methods, SEFM 2023 Collocated Workshops, held in Eindhoven, The Netherlands, on November 6–10, 2023 The 10 full papers presented in this book were carefully reviewed and selected from 16 submissions. SEFM 2023 Collocated Workshops presents the following two workshops: 5th International Workshop on Cognition: Interdisciplinary Foundations, Models and Applications (CIFMA 2023) 11th International Workshop on Open Community approaches to Education, Research and Technology (OpenCERT 2023) .


Multi
Software Engineering and Formal Methods. SEFM 2023 Collocated Workshops : CIFMA 2023 and OpenCERT 2023, Eindhoven, The Netherlands, November 6-10, 2023, Revised Selected Papers
Author:
ISBN: 9783031660214 9783031660207 9783031660221 Year: 2024 Publisher: Cham Springer Nature, Imprint: Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume constitutes the papers of two workshops which were held in conjunction with the 21st International Workshop on Software Engineering and Formal Methods, SEFM 2023 Collocated Workshops, held in Eindhoven, The Netherlands, on November 6–10, 2023 The 10 full papers presented in this book were carefully reviewed and selected from 16 submissions. SEFM 2023 Collocated Workshops presents the following two workshops: 5th International Workshop on Cognition: Interdisciplinary Foundations, Models and Applications (CIFMA 2023) 11th International Workshop on Open Community approaches to Education, Research and Technology (OpenCERT 2023) .


Book
User-Centric Networking : Future Perspectives
Authors: ---
ISBN: 3319052187 3319052179 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This work represents a milestone for the  "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.

Keywords

Home computer networks. --- Wireless communication systems. --- Customer services. --- Customer service --- Service, Customer --- Service (in industry) --- Services, Customer --- Technical service --- Customer relations --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- HMNs (Computer networks) --- Home area networks (Computer networks) --- Home media networks (Computer networks) --- Home multimedia networks (Computer networks) --- Home networks (Computer networks) --- Large family networks (Computer networks) --- Small office/home office networks (Computer networks) --- Home automation --- Local area networks (Computer networks) --- Computer network architectures. --- Engineering. --- Economic policy. --- Computer Communication Networks. --- Telecommunication. --- Computer Systems Organization and Communication Networks. --- Complexity. --- R & D/Technology Policy. --- Communications Engineering, Networks. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Economic nationalism --- Economic planning --- National planning --- State planning --- Economics --- Planning --- National security --- Social policy --- Construction --- Industrial arts --- Technology --- Computer organization. --- Computational complexity. --- Computer communication systems. --- Electrical engineering. --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Complexity, Computational --- Machine theory --- Organization, Computer --- Electronic digital computers --- Distributed processing


Digital
Foundations of Security Analysis and Design IV : FOSAD 2006/2007 Tutorial Lectures
Authors: ---
ISBN: 9783540748106 Year: 2007 Publisher: Berlin, Heidelberg Springer-Verlag Berlin Heidelberg


Digital
Foundations of Security Analysis and Design VI : FOSAD Tutorial Lectures
Authors: ---
ISBN: 9783642230820 Year: 2011 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg


Digital
User-Centric Networking : Future Perspectives
Authors: ---
ISBN: 9783319052182 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

This work represents a milestone for the  "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.


Book
Foundations of Security Analysis and Design VIII : FOSAD 2014/2015/2016 Tutorial Lectures
Authors: --- ---
ISBN: 3319430041 331943005X Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia and industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of four tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2014, 2015 and 2016. The topics covered in this book include zero-knowledge proof systems, JavaScript sandboxing, assessment of privacy, and distributed authorization.


Book
A Process Algebraic Approach to Software Architecture Design
Authors: --- ---
ISBN: 184800222X 9786613563019 1848002238 128038509X Year: 2010 Publisher: London : Springer London : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Concurrency theory, software architecture, system modeling and verification, and dependability and performance evaluation may seem unrelated disciplines, but in reality they are deeply intertwined and should be part of an integrated view in order to successfully manage the increasing complexity of software systems today. This book introduces a process algebraic approach to software architecture design. Process algebra, originally conceived for reasoning about the semantics of concurrent programs, provides a foundational basis for the modeling and verification of functional and nonfunctional aspects of communicating concurrent systems. This can be exploited at the software architecture level of design to improve the formality of design documents and make possible the analysis of system properties at the early design stages. The first part of the book offers an overview of the concepts and results of process algebra theory providing background material on the syntax and semantics for process calculi as well as on the bisimulation, testing, and trace approaches to the definition of behavioral equivalences for nondeterministic, deterministically timed, and stochastically timed processes. Part two gives guidelines for a principled transformation of process algebra into an architectural description language, before demonstrating how to use process algebraic techniques to address the detection of architecture-level mismatches, performance-driven selection among alternative designs, and the achievement of a tradeoff between dependability features and performance indices. Graduate students and software professionals, will find A Process Algebraic Approach to Software Architecture Design a useful addition to their bookshelf.


Book
Foundations of Security Analysis and Design VII : FOSAD 2012 / 2013 Tutorial Lectures
Authors: --- ---
ISBN: 3319100815 3319100823 Year: 2014 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.

Listing 1 - 10 of 34 << page
of 4
>>
Sort by