Narrow your search

Library

EhB (9)

VUB (9)

AP (2)

KDG (2)


Resource type

book (9)

digital (2)


Language

English (9)


Year
From To Submit

2011 (1)

2010 (4)

2009 (2)

2007 (1)

2005 (1)

Listing 1 - 9 of 9
Sort by

Book
Foundations of Security Analysis and Design VI : FOSAD Tutorial Lectures
Authors: --- ---
ISBN: 9783642230820 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.


Book
Foundations of Security Analysis and Design IV : FOSAD 2006/2007 Tutorial Lectures
Authors: --- ---
ISBN: 9783540748106 Year: 2007 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular,the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- ´ erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Jøsang gives an overviewofthebackground,currentstatus,andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter,MarcinCzenko,SandroEtalle,DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular,they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile devices.


Multi
Foundations of Security Analysis and Design V : FOSAD 2007/2008/2009 Tutorial Lectures
Authors: --- ---
ISBN: 9783642038297 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.


Book
Foundations of Security Analysis and Design V : FOSAD 2007/2008/2009 Tutorial Lectures
Authors: --- --- ---
ISBN: 9783642038297 Year: 2009 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.


Book
A Process Algebraic Approach to Software Architecture Design
Authors: --- --- ---
ISBN: 9781848002234 9781848828209 9781848002227 9781447157663 184800222X Year: 2010 Publisher: London Springer London Imprint Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Concurrency theory, software architecture, system modeling and verification, and dependability and performance evaluation may seem unrelated disciplines, but in reality they are deeply intertwined and should be part of an integrated view in order to successfully manage the increasing complexity of software systems today. This book introduces a process algebraic approach to software architecture design. Process algebra, originally conceived for reasoning about the semantics of concurrent programs, provides a foundational basis for the modeling and verification of functional and nonfunctional aspects of communicating concurrent systems. This can be exploited at the software architecture level of design to improve the formality of design documents and make possible the analysis of system properties at the early design stages. The first part of the book offers an overview of the concepts and results of process algebra theory providing background material on the syntax and semantics for process calculi as well as on the bisimulation, testing, and trace approaches to the definition of behavioral equivalences for nondeterministic, deterministically timed, and stochastically timed processes. Part two gives guidelines for a principled transformation of process algebra into an architectural description language, before demonstrating how to use process algebraic techniques to address the detection of architecture-level mismatches, performance-driven selection among alternative designs, and the achievement of a tradeoff between dependability features and performance indices. Graduate students and software professionals, will find A Process Algebraic Approach to Software Architecture Design a useful addition to their bookshelf.


Book
Foundations of Security Analysis and Design III : FOSAD 2004/2005 Tutorial Lectures
Authors: --- --- ---
ISBN: 9783540319368 Year: 2005 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The Int- national School on Foundations of Security Analysis and Design  (FOSAD, see http://www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea,especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http://www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer's LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005.


Multi
Computer Performance Engineering : 7th European Performance Engineering Workshop, EPEW 2010, Bertinoro, Italy, September 23-24, 2010, Proceedings
Authors: --- --- ---
ISBN: 9783642157844 9783642157837 9783642157851 Year: 2010 Publisher: Berlin, Heidelberg Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contains the proceedings of the 7th European Performance En- neering Workshop (EPEW 2010), held in Bertinoro, Italy, on September 23-24, 2010. The purpose of this workshop series is to gather academic and industrial researchers working on all aspects of performance engineering. This year the workshop was structured around three main areas: system and network p- formance engineering, software performance engineering, and the modeling and evaluation techniques supporting them. This edition of the workshop attracted 38 submissions, whose authors we wish to thank for their interest in EPEW 2010. After a careful review process during which every paper was refereed by at least three reviewers, the Program Committee selected 16 papers for presentation at the workshop. We warmly thank all the members of the ProgramCommittee and all the reviewersfor their fair and constructive comments and discussions. The workshop program was enriched by two keynote talks given by Marco Roccetti and Ralf Reussner. We conclude by expressing our gratitude to all the people who contributed to the organization of EPEW 2010, in particular the sta? of the University Residential Center of Bertinoro. We are also grateful to the EasyChair team for having allowed us to use their conference system and Springer for the continued editorial support of this workshop series.


Book
Computer Performance Engineering : 7th European Performance Engineering Workshop, EPEW 2010, Bertinoro, Italy, September 23-24, 2010. Proceedings
Authors: --- --- --- ---
ISBN: 9783642157844 9783642157837 9783642157851 Year: 2010 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contains the proceedings of the 7th European Performance En- neering Workshop (EPEW 2010), held in Bertinoro, Italy, on September 23-24, 2010. The purpose of this workshop series is to gather academic and industrial researchers working on all aspects of performance engineering. This year the workshop was structured around three main areas: system and network p- formance engineering, software performance engineering, and the modeling and evaluation techniques supporting them. This edition of the workshop attracted 38 submissions, whose authors we wish to thank for their interest in EPEW 2010. After a careful review process during which every paper was refereed by at least three reviewers, the Program Committee selected 16 papers for presentation at the workshop. We warmly thank all the members of the ProgramCommittee and all the reviewersfor their fair and constructive comments and discussions. The workshop program was enriched by two keynote talks given by Marco Roccetti and Ralf Reussner. We conclude by expressing our gratitude to all the people who contributed to the organization of EPEW 2010, in particular the sta? of the University Residential Center of Bertinoro. We are also grateful to the EasyChair team for having allowed us to use their conference system and Springer for the continued editorial support of this workshop series.


Book
Formal Methods for Quantitative Aspects of Programming Languages : 10th International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2010, Bertinoro, Italy, June 21-26, 2010, Advanced Lectures
Authors: --- --- --- ---
ISBN: 9783642136788 9783642136771 9783642136795 Year: 2010 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume presents the set of papers accompanying some of the lectures of the 10th International School on Formal Methods for the Design of Computer, Communication and Software Systems (SFM). Thisseriesofschoolsaddressestheuseofformalmethodsincomputerscience as a prominent approachto the rigorousdesign of the above-mentionedsystems. The main aim of the SFM series is to o?er a good spectrum of current research in foundations as well as applications of formal methods, which can be of help for graduate students and young researchers who intend to approach the ?eld. SFM 2010 was devoted to formal methods for quantitative aspects of p- gramminglanguagesandcoveredseveraltopicsincludingprobabilisticandtimed models, model checking, static analysis, quantum computing, real-time and - bedded systems, and security. This volume comprises four articles. The paper by Di Pierro, Hankin, and Wiklicky investigates the relation between the operational semantics of pro- bilistic programming languages and discrete-time Markov chains and presents a framework for probabilistic program analysis inspired by classical abstract interpretation. Broadbent, Fitzsimons, and Kashe? review the mathematical model underlying measurement-based quantum computation, a novel approach to quantum computation where measurement is the main driving force of c- putation instead of the unitary operations of the more traditional quantum c- cuit model. The paper by Malacaria and Heusser illustrates the informati- theoretical basis of quantitative information ?ow by showing the relationship betweenlattices,partitions,andinformation-theoreticalconcepts,aswellastheir applicabilitytoquantifyleakageofcon?dentialinformationinprograms. Finally, Wolter and Reinecke discuss the trade-o? between performance and security by formulating metrics that explicitly express the trade-o? and by showing how to ?nd system parameters that optimize those metrics.

Listing 1 - 9 of 9
Sort by