Listing 1 - 10 of 22 | << page >> |
Sort by
|
Choose an application
Whereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects of Java and offers a security evaluation for the Java platform. After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations. Topics and features: • Presents the security model underlying Java ME • Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities • Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework • Discusses the most prominent standards that are relevant for Java ME security • Reports on areas of common vulnerabilities, and considers specifications and programming mistakes • Hints and suggestions are provided as ways for hardening security This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guide for self study in the field.
Computer networks --- Java (Computer program language) --- Mobile computing. --- Portable computers. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Electronic data processing --- Context-aware computing --- Portable computers --- Object-oriented programming languages --- JavaSpaces technology --- Computers, Portable --- Microcomputers --- Mobile computing --- Computer science. --- Computer security. --- Computer network architectures. --- Software engineering. --- Data encryption (Computer science). --- Programming Techniques. --- Computer Engineering. --- Systems and Data Security. --- Computer Systems Organization and Communication Networks. --- Software Engineering/Programming and Operating Systems. --- Cryptology. --- Computer software engineering --- Engineering --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Informatics --- Science --- Protection --- Security measures --- Computer programming. --- Computer engineering. --- Computer organization. --- Organization, Computer --- Electronic computer programming --- Programming (Electronic computers) --- Coding theory --- Design and construction --- Programming
Choose an application
Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird’s eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Modeling Language (UML) and the more recent Systems Modeling Language (SysML). Moreover, it elaborates on a number of quantitative and qualitative techniques that synergistically combine automatic verification techniques, program analysis, and software engineering quantitative methods applicable to design models described in these modeling languages. Each of these techniques is additionally explained using a case study highlighting the process, its results, and resulting changes in the system design. Researchers in academia and industry as well as students specializing in software and systems engineering will find here an overview of state-of-the-art validation and verification techniques. Due to their close association with the UML standard, the presented approaches are also applicable to industrial software development.
Quality assurance. --- Quality control. --- System failures (Engineering) -- Prevention. --- Systems engineering. --- Testing. --- Systems engineering --- Expert systems (Computer science) --- UML (Computer science) --- SysML (Computer science) --- Engineering & Applied Sciences --- Computer Science --- Verification --- Validation --- Information Technology --- Software Engineering --- Unified Modeling Language (Computer science) --- OMG SysML (Computer science) --- Systems Modeling Language (Computer science) --- Engineering systems --- System engineering --- Design and construction --- Computer science. --- Computer system failures. --- Software engineering. --- Management information systems. --- Computer Science. --- Software Engineering/Programming and Operating Systems. --- Software Engineering. --- System Performance and Evaluation. --- Management of Computing and Information Systems. --- Computer software --- Modeling languages (Computer science) --- Object-oriented methods (Computer science) --- Engineering --- Industrial engineering --- System analysis --- Development --- Computer system performance. --- Information Systems. --- Computer software engineering --- Informatics --- Science --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Computer failures --- Computer malfunctions --- Computer systems --- Failure of computer systems --- System failures (Engineering) --- Fault-tolerant computing --- Communication systems --- Failures
Choose an application
This book constitutes the revised selected papers of the 11th International Symposium on Foundations and Practice of Security, FPS 2018, held in Montreal, QC, Canada, in March 2018. The 16 full papers, 1 short paper, 1 position paper and 2 invited papers presented in this book, were carefully reviewed and selected from 51 submissions. They cover a range of topics including mobile security; cloud security and big data; IoT security; software security, malware analysis, and vulnerability detection; cryptography; cyber physical security and hardware security; and access control.
Data protection. --- Information systems. --- Software engineering. --- Artificial intelligence. --- Computer science. --- Security. --- Information Systems and Communication Service. --- Software Engineering. --- Artificial Intelligence. --- Programming Techniques. --- Programming Languages, Compilers, Interpreters. --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer software engineering --- Engineering --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data encryption (Computer science) --- Computers. --- Computer programming. --- Programming languages (Electronic computers). --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Languages, Artificial --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Calculators --- Cyberspace --- Programming
Choose an application
The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats for society are illustrated in this book. This book not only explores the growing needs of cybersecurity and digital forensics but also investigates relevant technologies and methods to meet the said needs. Knowledge discovery, machine learning and data analytics are explored for collecting cyber-intelligence and forensics evidence on cybercrimes. Online communication documents, which are the main source of cybercrimes are investigated from two perspectives: the crime and the criminal. AI and machine learning methods are applied to detect illegal and criminal activities such as bot distribution, drug trafficking and child pornography. Authorship analysis is applied to identify the potential suspects and their social linguistics characteristics. Deep learning together with frequent pattern mining and link mining techniques are applied to trace the potential collaborators of the identified criminals. Finally, the aim of the book is not only to investigate the crimes and identify the potential suspects but, as well, to collect solid and precise forensics evidence to prosecute the suspects in the court of law. .
Data mining. --- Machine learning. --- Computer crimes. --- Data Mining and Knowledge Discovery. --- Machine Learning. --- Cybercrime. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Crime --- Privacy, Right of --- Learning, Machine --- Artificial intelligence --- Machine theory --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching
Choose an application
Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- embedded systems --- DES (data encryption standard) --- computerbesturingssystemen --- programmeren (informatica) --- informatiesystemen --- Java (informatica) --- OS (operating system)
Choose an application
This book constitutes the carefully refereed post-proceedings of the 6th Symposium on Foundations and Practice of Security, FPS 2013, held in La Rochelle, France, in October 2013. The 25 revised full papers presented together with a keynote address were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on security protocols, formal methods, physical security, attack classification and assessment, access control, cipher attacks, ad-hoc and sensor networks, resilience and intrusion detection.
Computer security --- Data encryption (Computer science) --- Computer networks --- Access control --- Data encryption (Computer science). --- Computer security. --- Coding theory. --- Cryptology. --- Systems and Data Security. --- Coding and Information Theory. --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Protection --- Security measures --- Information theory. --- Communication theory --- Communication --- Cybernetics
Choose an application
Whereas Java brings functionality and versatility to the world of mobile devices, at the same time it also introduces new security threats. The rapid growth of the number of mobile devices that support Java makes this a pressing issue. Embedded Java Security carefully examines the security aspects of Java and offers a security evaluation for the Java platform. After explaining background material on the architecture of embedded platforms and relating to its role in security, the book deconstructs the security model into its main components: It explains each component and relates it to the aim of securing the applications and the device. Toward this end, several implementations of the Java platform are examined and tested to relate the model to its actual implementation on devices. The security holes found are further used to clarify security issues and point out common errors. Finally, the book provides an evaluation of embedded Java security that includes security models and security tests performed on real-life implementations. Topics and features: ¢ Presents the security model underlying Java ME ¢ Provides a vulnerability analysis of Java CLDL and a risk analysis study of Java ME vulnerabilities ¢ Supplies an example of a protection profile for Java ME - illustrated using the common criteria framework ¢ Discusses the most prominent standards that are relevant for Java ME security ¢ Reports on areas of common vulnerabilities, and considers specifications and programming mistakes ¢ Hints and suggestions are provided as ways for hardening security This invaluable volume provides researchers and practitioners with a broader and deeper understanding of the issues involved in embedded Java security, and, as a larger view, mobile-devices security. It can also serve as an ancillary course text or helpful guide for self study in the field.
Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- ICT (informatie- en communicatietechnieken) --- embedded systems --- DES (data encryption standard) --- computerbesturingssystemen --- programmeren (informatica) --- informatiesystemen --- Java (informatica) --- OS (operating system)
Choose an application
Verification and validation represents an important process used for the quality assessment of engineered systems and their compliance with the requirements established at the beginning of or during the development cycle. Debbabi and his coauthors investigate methodologies and techniques that can be employed for the automatic verification and validation of systems engineering design models expressed in standardized modeling languages. Their presentation includes a bird's eye view of the most prominent modeling languages for software and systems engineering, namely the Unified Modeling Language (UML) and the more recent Systems Modeling Language (SysML). Moreover, it elaborates on a number of quantitative and qualitative techniques that synergistically combine automatic verification techniques, program analysis, and software engineering quantitative methods applicable to design models described in these modeling languages. Each of these techniques is additionally explained using a case study highlighting the process, its results, and resulting changes in the system design. Researchers in academia and industry as well as students specializing in software and systems engineering will find here an overview of state-of-the-art validation and verification techniques. Due to their close association with the UML standard, the presented approaches are also applicable to industrial software development.
Computer science --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- MIS (management informatie systeem) --- computers --- informatica --- computerbesturingssystemen --- programmeren (informatica) --- software engineering --- informatica management --- computerkunde
Choose an application
Criminal law. Criminal procedure --- Programming --- Information systems --- Computer. Automation --- programmeren (informatica) --- computercriminaliteit --- data acquisition
Choose an application
Mathematical statistics --- Programming --- Computer architecture. Operating systems --- Computer. Automation --- patroonherkenning --- veiligheid (technologie) --- GSM (global system for mobile communications) --- factoranalyse --- programmeren (informatica) --- netwerken (informatica) --- mobiele communicatie
Listing 1 - 10 of 22 | << page >> |
Sort by
|