Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Computational Methods in Systems Biology, CMSB 2009, held in Bologna, Italy, August 31 - September 1, 2009. The 18 revised full papers presented together with the summaries of 3 invited papers were carefully reviewed and selected from more than 45 submissions. The papers cover theoretical or applied contributions that are motivated by a biological question focusing on modeling approaches, including process algebra, simulation approaches, analysis methods, in particular model checking and flux analysis, and case studies.
Molecular biology --- Bioinformatics --- Proteomics --- Genomics --- Systems biology --- Biological models --- Models, Biological --- Congresses --- Systems Biology --- Methods --- Models, Genetic --- Models, Theoretical --- Publication Formats --- Computational Biology --- Investigative Techniques --- Publication Characteristics --- Analytical, Diagnostic and Therapeutic Techniques and Equipment --- Biology --- Biological Science Disciplines --- Natural Science Disciplines --- Disciplines and Occupations --- Biophysics --- Biology - General --- Health & Biological Sciences --- Data processing --- Methodology --- Computational biology. --- Data processing. --- Molecular biochemistry --- Molecular biophysics --- Life sciences. --- Computers. --- Numerical analysis. --- Computer simulation. --- Bioinformatics. --- Life Sciences. --- Life Sciences, general. --- Theory of Computation. --- Computational Biology/Bioinformatics. --- Simulation and Modeling. --- Computation by Abstract Devices. --- Numeric Computing. --- Bio-informatics --- Biological informatics --- Information science --- Computational biology --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- Mathematical analysis --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Biosciences --- Sciences, Life --- Science --- Biochemistry --- Biomolecules --- Information theory. --- Computer science. --- Electronic data processing. --- ADP (Data processing) --- Automatic data processing --- EDP (Data processing) --- IDP (Data processing) --- Integrated data processing --- Computers --- Office practice --- Communication theory --- Communication --- Informatics --- Automation
Choose an application
This volume contains the proceedings of the 8th IFIP International Conf- enceonFormalMethodsforOpenObject-basedDistributedSystems(FMOODS 2006). The conference was held in Bologna, Italy, 14-16 June 2006, as part of the federated multiconference DisCoTec (Distributed Computing Techniques), together with the 8th International Conference on Coordination Models and Languages (COORDINATION) and the 6th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS). DisCoTec was organizedby the Department of Computer Science of the University of Bologna. Established in 1996, the FMOODS series of conferences aims to provide an integratedforum for researchon formalaspects of open object-baseddistributed systems. The FMOODS 2006 especially attracted novel contributions re?ecting recent developments in the area, such as component- and model-based design, service-oriented computing, and software quality. Some more speci?c topics of interest were: semantics and implementation of object-oriented programming and (visual) modelling languages; formal techniques for speci?cation, design, analysis,veri?cation,validation and testing; formal methods for service-oriented computing;andintegrationofqualityofservicerequirementsintoformalmodels. These proceedings contain a selection of 16 research contributions, out of 51 submissions, which went through a rigorous review process by international reviewers.We therefore owe special thanks to all members of the ProgramC- mittee, and their sub-referees,for the excellent work they have done in the short time they had. Additionally, these proceedings include three invited papers by Pierpaolo Degano (University of Pisa), Jos´ e Luiz Fiadeiro (University of Leicester) and Davide Sangiorgi (University of Bologna).
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- programmeren (informatica) --- programmeertalen --- software engineering --- OS (operating system) --- computernetwerken
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.
Logic --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- ontwerpen --- programmeren (informatica) --- programmeertalen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular,the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- ´ erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Jøsang gives an overviewofthebackground,currentstatus,andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter,MarcinCzenko,SandroEtalle,DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular,they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile devices.
Choose an application
This book constitutes the refereed proceedings of the 7th International Conference on Computational Methods in Systems Biology, CMSB 2009, held in Bologna, Italy, August 31 - September 1, 2009. The 18 revised full papers presented together with the summaries of 3 invited papers were carefully reviewed and selected from more than 45 submissions. The papers cover theoretical or applied contributions that are motivated by a biological question focusing on modeling approaches, including process algebra, simulation approaches, analysis methods, in particular model checking and flux analysis, and case studies.
Histology. Cytology --- Molecular biology --- Biology --- Computer science --- Programming --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- vormgeving --- biologie --- informatica --- cytologie --- simulaties --- histologie --- KI (kunstmatige intelligentie) --- moleculaire biologie --- numerieke analyse
Choose an application
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- informatica --- programmeren (informatica) --- programmeertalen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations. This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- informatica --- programmeren (informatica) --- programmeertalen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The Int- national School on Foundations of Security Analysis and Design (FOSAD, see http://www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea,especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http://www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer's LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005.
Choose an application
Electronic data processing --- Object-oriented programming (Computer science) --- Traitement réparti --- Programmation orientée objet (Informatique) --- Distributed processing --- Congresses. --- Congrès --- Telecommunications --- Computer Science --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Operating systems (Computers). --- Computer logic. --- Computer Science. --- Computer Communication Networks. --- Programming Techniques. --- Software Engineering. --- Operating Systems. --- Programming Languages, Compilers, Interpreters. --- Logics and Meanings of Programs. --- Computer science logic --- Logic, Symbolic and mathematical --- Computer operating systems --- Computers --- Disk operating systems --- Systems software --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Languages, Artificial --- Computer software engineering --- Engineering --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Operating systems --- Programming --- Logic design. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory