Narrow your search

Library

KU Leuven (15)

Odisee (15)

Thomas More Kempen (15)

Thomas More Mechelen (15)

ULB (15)

ULiège (15)

VIVES (15)

UCLL (13)

AP (11)

KDG (11)

More...

Resource type

book (26)

digital (11)


Language

English (34)


Year
From To Submit

2024 (2)

2016 (3)

2015 (2)

2014 (4)

2011 (3)

More...
Listing 11 - 20 of 34 << page
of 4
>>
Sort by

Book
Foundations of Security Analysis and Design VI : FOSAD Tutorial Lectures
Authors: --- ---
ISBN: 9783642230820 Year: 2011 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.


Book
Foundations of Security Analysis and Design IV : FOSAD 2006/2007 Tutorial Lectures
Authors: --- ---
ISBN: 9783540748106 Year: 2007 Publisher: Berlin Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular,the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- ´ erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Jøsang gives an overviewofthebackground,currentstatus,andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter,MarcinCzenko,SandroEtalle,DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular,they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile devices.


Book
A process algebraic approach to software architecture design
Authors: --- ---
Year: 2010 Publisher: London: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
A process algebraic approach to software architecture design
Authors: --- ---
Year: 2010 Publisher: London: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Digital
Foundations of Security Analysis and Design III : FOSAD 2004/2005 Tutorial Lectures
Authors: --- ---
ISBN: 9783540319368 Year: 2005 Publisher: Berlin Heidelberg Springer-Verlag GmbH


Multi
Foundations of Security Analysis and Design V : FOSAD 2007/2008/2009 Tutorial Lectures
Authors: --- ---
ISBN: 9783642038297 Year: 2009 Publisher: Berlin, Heidelberg Springer Berlin Heidelberg

Loading...
Export citation

Choose an application

Bookmark

Abstract

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.


Digital
Foundations of Security Analysis and Design VII : FOSAD 2012/2013 Tutorial Lectures
Authors: --- ---
ISBN: 9783319100821 Year: 2014 Publisher: Cham Springer International Publishing

Loading...
Export citation

Choose an application

Bookmark

Abstract

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.


Digital
A Process Algebraic Approach to Software Architecture Design
Authors: --- ---
ISBN: 9781848002234 9781848828209 9781848002227 9781447157663 Year: 2010 Publisher: London Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Concurrency theory, software architecture, system modeling and verification, and dependability and performance evaluation may seem unrelated disciplines, but in reality they are deeply intertwined and should be part of an integrated view in order to successfully manage the increasing complexity of software systems today. This book introduces a process algebraic approach to software architecture design. Process algebra, originally conceived for reasoning about the semantics of concurrent programs, provides a foundational basis for the modeling and verification of functional and nonfunctional aspects of communicating concurrent systems. This can be exploited at the software architecture level of design to improve the formality of design documents and make possible the analysis of system properties at the early design stages. The first part of the book offers an overview of the concepts and results of process algebra theory providing background material on the syntax and semantics for process calculi as well as on the bisimulation, testing, and trace approaches to the definition of behavioral equivalences for nondeterministic, deterministically timed, and stochastically timed processes. Part two gives guidelines for a principled transformation of process algebra into an architectural description language, before demonstrating how to use process algebraic techniques to address the detection of architecture-level mismatches, performance-driven selection among alternative designs, and the achievement of a tradeoff between dependability features and performance indices. Graduate students and software professionals, will find A Process Algebraic Approach to Software Architecture Design a useful addition to their bookshelf.


Book
Computer performance engineering : 7th European Performance Engineering Workshop, EPEW 2010, Bertinoro, Italy, September 23-24, 2010 : proceedings
Authors: --- --- --- ---
ISBN: 3642157831 9786613566980 364215784X 1280389060 Year: 2010 Publisher: Berlin ; New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contains the proceedings of the 7th European Performance En- neering Workshop (EPEW 2010), held in Bertinoro, Italy, on September 23–24, 2010. The purpose of this workshop series is to gather academic and industrial researchers working on all aspects of performance engineering. This year the workshop was structured around three main areas: system and network p- formance engineering, software performance engineering, and the modeling and evaluation techniques supporting them. This edition of the workshop attracted 38 submissions, whose authors we wish to thank for their interest in EPEW 2010. After a careful review process during which every paper was refereed by at least three reviewers, the Program Committee selected 16 papers for presentation at the workshop. We warmly thank all the members of the ProgramCommittee and all the reviewersfor their fair and constructive comments and discussions. The workshop program was enriched by two keynote talks given by Marco Roccetti and Ralf Reussner. We conclude by expressing our gratitude to all the people who contributed to the organization of EPEW 2010, in particular the sta? of the University Residential Center of Bertinoro. We are also grateful to the EasyChair team for having allowed us to use their conference system and Springer for the continued editorial support of this workshop series.

Keywords

Formal methods (Computer science) --- Stochastic models --- Computer systems --- Engineering & Applied Sciences --- Computer Science --- Evaluation --- Information Technology --- Software Engineering --- Models, Stochastic --- Computer science. --- Computer communication systems. --- Software engineering. --- Computer programming. --- Computer logic. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- Computer Communication Networks. --- Logics and Meanings of Programs. --- Information Systems Applications (incl. Internet). --- Programming Techniques. --- Computer science logic --- Logic, Symbolic and mathematical --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Programming --- Distributed processing --- Mathematical models --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software


Book
Data Privacy Management and Security Assurance : 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings
Authors: --- --- --- ---
ISBN: 331947071X 3319470728 Year: 2016 Publisher: Cham : Springer International Publishing : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration and privacy engineering. The QASA workshop centeres around research topics with a particular emphasis on the techniques for service oriented architectures, including aspects of dependability, privacy, risk and trust. Three full papers and one short papers out of 8 submissions are included in QASA 2016. .

Listing 11 - 20 of 34 << page
of 4
>>
Sort by