Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.
Logic --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- ontwerpen --- programmeren (informatica) --- programmeertalen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular,the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- ´ erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Jøsang gives an overviewofthebackground,currentstatus,andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter,MarcinCzenko,SandroEtalle,DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular,they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile devices.
Choose an application
Choose an application
Choose an application
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- informatica --- programmeren (informatica) --- programmeertalen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.
Mathematical control systems --- Computer science --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- toegepaste informatica --- DES (data encryption standard) --- cloud computing --- computers --- informatica --- informatiesystemen --- computerbeveiliging --- informatica management --- computerkunde --- informatietheorie
Choose an application
Concurrency theory, software architecture, system modeling and verification, and dependability and performance evaluation may seem unrelated disciplines, but in reality they are deeply intertwined and should be part of an integrated view in order to successfully manage the increasing complexity of software systems today. This book introduces a process algebraic approach to software architecture design. Process algebra, originally conceived for reasoning about the semantics of concurrent programs, provides a foundational basis for the modeling and verification of functional and nonfunctional aspects of communicating concurrent systems. This can be exploited at the software architecture level of design to improve the formality of design documents and make possible the analysis of system properties at the early design stages. The first part of the book offers an overview of the concepts and results of process algebra theory providing background material on the syntax and semantics for process calculi as well as on the bisimulation, testing, and trace approaches to the definition of behavioral equivalences for nondeterministic, deterministically timed, and stochastically timed processes. Part two gives guidelines for a principled transformation of process algebra into an architectural description language, before demonstrating how to use process algebraic techniques to address the detection of architecture-level mismatches, performance-driven selection among alternative designs, and the achievement of a tradeoff between dependability features and performance indices. Graduate students and software professionals, will find A Process Algebraic Approach to Software Architecture Design a useful addition to their bookshelf.
Programming --- Computer architecture. Operating systems --- Computer. Automation --- computers --- informatica --- computerbesturingssystemen --- programmeren (informatica) --- software engineering
Choose an application
This volume contains the proceedings of the 7th European Performance En- neering Workshop (EPEW 2010), held in Bertinoro, Italy, on September 23–24, 2010. The purpose of this workshop series is to gather academic and industrial researchers working on all aspects of performance engineering. This year the workshop was structured around three main areas: system and network p- formance engineering, software performance engineering, and the modeling and evaluation techniques supporting them. This edition of the workshop attracted 38 submissions, whose authors we wish to thank for their interest in EPEW 2010. After a careful review process during which every paper was refereed by at least three reviewers, the Program Committee selected 16 papers for presentation at the workshop. We warmly thank all the members of the ProgramCommittee and all the reviewersfor their fair and constructive comments and discussions. The workshop program was enriched by two keynote talks given by Marco Roccetti and Ralf Reussner. We conclude by expressing our gratitude to all the people who contributed to the organization of EPEW 2010, in particular the sta? of the University Residential Center of Bertinoro. We are also grateful to the EasyChair team for having allowed us to use their conference system and Springer for the continued editorial support of this workshop series.
Formal methods (Computer science) --- Stochastic models --- Computer systems --- Engineering & Applied Sciences --- Computer Science --- Evaluation --- Information Technology --- Software Engineering --- Models, Stochastic --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer programming. --- Computer logic. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- Computer Communication Networks. --- Logics and Meanings of Programs. --- Information Systems Applications (incl. Internet). --- Programming Techniques. --- Computer science logic --- Logic, Symbolic and mathematical --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Programming --- Distributed processing --- Mathematical models --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration and privacy engineering. The QASA workshop centeres around research topics with a particular emphasis on the techniques for service oriented architectures, including aspects of dependability, privacy, risk and trust. Three full papers and one short papers out of 8 submissions are included in QASA 2016. .
Computer science. --- Computer security. --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Management of Computing and Information Systems. --- Data Encryption. --- Information Systems Applications (incl. Internet). --- Algorithm Analysis and Problem Complexity. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Algorism --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Sociotechnical systems --- Information resources management --- Management --- Algebra --- Arithmetic --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Foundations --- Information Systems. --- Computer software. --- Cryptology. --- Software, Computer --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software