Listing 1 - 10 of 34 | << page >> |
Sort by
|
Choose an application
The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The “Int- national School on Foundations of Security Analysis and Design” (FOSAD, see http://www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea,especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http://www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer’s LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005.
Computer security --- Computer networks --- Sécurité informatique --- Réseaux d'ordinateurs --- Congresses --- Security measures --- Congresses. --- Congrès --- Sécurité --- Mesures --- Computer Communication Networks --- Computer Science --- Data encryption (Computer science) --- Information Systems --- Logic design --- Operating systems (Computers) --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Operating systems (Computers). --- Computer security. --- Data encryption (Computer science). --- Computer logic. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Operating Systems. --- Computer Communication Networks. --- Management of Computing and Information Systems. --- Logics and Meanings of Programs. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer science logic --- Logic, Symbolic and mathematical --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Computer operating systems --- Disk operating systems --- Systems software --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Communication systems --- Protection --- Operating systems --- Distributed processing --- Information Systems. --- Logic design. --- Cryptology. --- Design, Logic --- Design of logic systems --- Digital electronics --- Electronic circuit design --- Logic circuits --- Machine theory --- Switching theory --- Data protection. --- Cryptography. --- Computer networks. --- Data and Information Security. --- IT Operations. --- Computer Science Logic and Foundations of Programming. --- Management. --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data governance --- Data regulation --- Personal data protection --- Protection, Data
Choose an application
This volume constitutes the papers of two workshops which were held in conjunction with the 21st International Workshop on Software Engineering and Formal Methods, SEFM 2023 Collocated Workshops, held in Eindhoven, The Netherlands, on November 6–10, 2023 The 10 full papers presented in this book were carefully reviewed and selected from 16 submissions. SEFM 2023 Collocated Workshops presents the following two workshops: 5th International Workshop on Cognition: Interdisciplinary Foundations, Models and Applications (CIFMA 2023) 11th International Workshop on Open Community approaches to Education, Research and Technology (OpenCERT 2023) .
Software engineering. --- Computer systems. --- Computer science. --- Computer programming. --- Software Engineering. --- Computer System Implementation. --- Theory of Computation. --- Programming Techniques.
Choose an application
This volume constitutes the papers of two workshops which were held in conjunction with the 21st International Workshop on Software Engineering and Formal Methods, SEFM 2023 Collocated Workshops, held in Eindhoven, The Netherlands, on November 6–10, 2023 The 10 full papers presented in this book were carefully reviewed and selected from 16 submissions. SEFM 2023 Collocated Workshops presents the following two workshops: 5th International Workshop on Cognition: Interdisciplinary Foundations, Models and Applications (CIFMA 2023) 11th International Workshop on Open Community approaches to Education, Research and Technology (OpenCERT 2023) .
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- toegepaste informatica --- computers --- programmeren (informatica) --- software engineering --- computerkunde --- Software engineering. --- Computer systems. --- Computer science. --- Computer programming. --- Software Engineering. --- Computer System Implementation. --- Theory of Computation. --- Programming Techniques.
Choose an application
This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.
Home computer networks. --- Wireless communication systems. --- Customer services. --- Customer service --- Service, Customer --- Service (in industry) --- Services, Customer --- Technical service --- Customer relations --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Telecommunication systems --- HMNs (Computer networks) --- Home area networks (Computer networks) --- Home media networks (Computer networks) --- Home multimedia networks (Computer networks) --- Home networks (Computer networks) --- Large family networks (Computer networks) --- Small office/home office networks (Computer networks) --- Home automation --- Local area networks (Computer networks) --- Computer network architectures. --- Engineering. --- Economic policy. --- Computer Communication Networks. --- Telecommunication. --- Computer Systems Organization and Communication Networks. --- Complexity. --- R & D/Technology Policy. --- Communications Engineering, Networks. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Economic nationalism --- Economic planning --- National planning --- State planning --- Economics --- Planning --- National security --- Social policy --- Construction --- Industrial arts --- Technology --- Computer organization. --- Computational complexity. --- Computer communication systems. --- Electrical engineering. --- Electric engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Complexity, Computational --- Machine theory --- Organization, Computer --- Electronic digital computers --- Distributed processing
Choose an application
Choose an application
Logic --- Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- DES (data encryption standard) --- ontwerpen --- programmeren (informatica) --- programmeertalen --- computerbeveiliging --- informatica management --- computernetwerken
Choose an application
This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.
Economics --- Methodology of economics --- Economic policy and planning (general) --- Physics --- Telecommunication technology --- Applied physical engineering --- Business economics --- Mass communications --- Computer science --- Computer architecture. Operating systems --- technologiebeleid --- draadloze computernetwerken --- computers --- economie --- informatica --- computerbesturingssystemen --- tekstverwerking --- OS (operating system) --- ingenieurswetenschappen --- fysica --- computernetwerken --- computerkunde --- communicatietechnologie
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia and industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of four tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2014, 2015 and 2016. The topics covered in this book include zero-knowledge proof systems, JavaScript sandboxing, assessment of privacy, and distributed authorization.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Computers and civilization. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Information Systems Applications (incl. Internet). --- Computers and Society. --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Civilization and computers --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Sociotechnical systems --- Information resources management --- Management --- Civilization --- Computer security --- Cryptography --- Data protection --- Security systems --- Hacking --- Science --- Communication systems --- Information Systems. --- Cryptology. --- Computer networks --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
Concurrency theory, software architecture, system modeling and verification, and dependability and performance evaluation may seem unrelated disciplines, but in reality they are deeply intertwined and should be part of an integrated view in order to successfully manage the increasing complexity of software systems today. This book introduces a process algebraic approach to software architecture design. Process algebra, originally conceived for reasoning about the semantics of concurrent programs, provides a foundational basis for the modeling and verification of functional and nonfunctional aspects of communicating concurrent systems. This can be exploited at the software architecture level of design to improve the formality of design documents and make possible the analysis of system properties at the early design stages. The first part of the book offers an overview of the concepts and results of process algebra theory providing background material on the syntax and semantics for process calculi as well as on the bisimulation, testing, and trace approaches to the definition of behavioral equivalences for nondeterministic, deterministically timed, and stochastically timed processes. Part two gives guidelines for a principled transformation of process algebra into an architectural description language, before demonstrating how to use process algebraic techniques to address the detection of architecture-level mismatches, performance-driven selection among alternative designs, and the achievement of a tradeoff between dependability features and performance indices. Graduate students and software professionals, will find A Process Algebraic Approach to Software Architecture Design a useful addition to their bookshelf.
Software architecture. --- Software engineering. --- Engineering & Applied Sciences --- Computer Science --- Information Technology --- Software Engineering --- Computer software engineering --- Architecture, Software --- Computer software --- Computer software architecture --- Architecture --- Design --- Computer science. --- Computer system failures. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- System Performance and Evaluation. --- Engineering --- Computer system performance. --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Failures --- Software architecture
Choose an application
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.
Computer science. --- Computer security. --- Data encryption (Computer science). --- Computers. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Management of Computing and Information Systems. --- Theory of Computation. --- Information Systems. --- Information theory. --- Cryptology. --- Communication theory --- Communication --- Cybernetics --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Machine theory --- Calculators --- Cyberspace --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Communication systems --- Data encryption (Computer science)
Listing 1 - 10 of 34 | << page >> |
Sort by
|