Listing 1 - 4 of 4 |
Sort by
|
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Theory of Computation. --- Information Systems. --- Information theory. --- Cryptology. --- Communication theory --- Communication --- Cybernetics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Cyberspace --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems --- Data encryption (Computer science)
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.
Mathematical control systems --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste informatica --- DES (data encryption standard) --- cloud computing --- computers --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computerkunde --- informatietheorie
Choose an application
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.
software engineering --- Computer. Automation --- Computer architecture. Operating systems --- Logic --- informatica --- Information systems --- informatiesystemen --- ontwerpen --- computerkunde --- computers --- informatica management --- programmeren (informatica) --- Computer science --- DES (data encryption standard) --- computerbeveiliging --- Computer science. --- Software engineering. --- Data protection. --- Data encryption (Computer science) --- Logic design. --- Information Systems. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer software engineering --- Engineering --- Informatics --- Science --- Internet --- Computer networks --- Security measures. --- Computer security. --- Data encryption (Computer science). --- Systems and Data Security. --- Software Engineering. --- Management of Computing and Information Systems. --- Logics and Meanings of Programs. --- Information Systems Applications (incl. Internet). --- Cryptology. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Computer network security --- Network security, Computer --- Security of computer networks --- Management information systems. --- Computer logic. --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer science logic --- Logic, Symbolic and mathematical --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems --- Software engineering --- Logic design --- Information Systems --- Seguridad informática
Choose an application
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the Network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.
Logic --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- computers --- informatica --- ontwerpen --- programmeren (informatica) --- informatiesystemen --- software engineering --- computerbeveiliging --- informatica management --- computerkunde
Listing 1 - 4 of 4 |
Sort by
|