Listing 1 - 9 of 9 |
Sort by
|
Choose an application
Computer. Automation --- software engineering --- informatica management
Choose an application
Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jürjens presents the UML extension UMLsec for secure systems development. It uses the standard UML extension mechanisms, and can be employed to evaluate UML specifications for vulnerabilities using a formal semantics of a simplified fragment of UML. Established rules of security engineering can be encapsulated and hence made available even to developers who are not specialists in security. As one example, Jürjens uncovers a flaw in the Common Electronic Purse Specification, and proposes and verifies a correction. With a clear separation between the general description of his approach and its mathematical foundations, the book is ideally suited both for researchers and graduate students in UML or formal methods and security, and for advanced professionals writing critical applications.
Computer. Automation --- software engineering --- informatica management
Choose an application
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.
Computer science. --- Computer Communication Networks. --- Software engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Data Structures, Cryptology and Information Theory. --- Math Applications in Computer Science. --- Models and Principles. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Computer software engineering --- Informatics --- Computer communication systems. --- Computer science --- Computers. --- Mathematics. --- Computer security --- Software engineering --- Data encryption (Computer science) --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Engineering --- Cryptography --- Science --- Computer science—Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Distributed processing --- Seguridad informática
Choose an application
This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.
Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- cryptologie --- computers --- informatica --- computerbesturingssystemen --- programmeren (informatica) --- wiskunde --- software engineering --- programmatielogica --- computernetwerken --- computerkunde
Choose an application
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.
Mathematics --- Computer science --- Programming --- Computer architecture. Operating systems --- Information systems --- Computer. Automation --- DES (data encryption standard) --- cryptologie --- computers --- informatica --- computerbesturingssystemen --- programmeren (informatica) --- wiskunde --- software engineering --- programmatielogica --- computernetwerken --- computerkunde
Choose an application
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.
Computer security --- Computer networks --- Software engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Software engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computers. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Data Structures, Cryptology and Information Theory. --- Math Applications in Computer Science. --- Models and Principles. --- Mathematics. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer science—Mathematics. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Distributed processing --- Computer networks. --- Data encryption (Computer science)
Choose an application
Choose an application
Privacy is a burden for most organizations, the more complex and wider an organization is, the harder to manage and enforce privacy is. GDPR and other regulations on privacy impose strict constraints that must be coherently enforced, considering also privacy needs of organization and their users. Furthermore, organizations should allow their users to express their privacy needs easily, even when the process that manages users' data is complex and involves multiple organizations. Many research work consider the problem using simplistic examples, with solutions proposed that never actually touch pragmatic problems of real, large organizations, with thousands of users and terabytes of personal and sensitive data. This book faces the privacy management problem targeting actual large organizations, such as public administrations, including stakeholders in the process of definition of the solution and evaluating the results with its actual integration in four large organizations. The contribution of this book is twofold: a privacy platform that can be customized and used to manage privacy in large organizations; and the process for the design of such a platform, from a state-of-the-art survey on privacy regulations, through the definition of its requirements, its design and its architecture, until the evaluation of the platform.
Electrical engineering --- Applied physical engineering --- Programming --- Computer architecture. Operating systems --- applicatiebeheer --- apps --- elektrotechniek --- architectuur (informatica)
Choose an application
Listing 1 - 9 of 9 |
Sort by
|