| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990000816720403321 |
|
|
Autore |
Gregory, Geoffrey |
|
|
Titolo |
Decision Analysis / Geoffrey Gregory |
|
|
|
|
|
Pubbl/distr/stampa |
|
|
New York [etc.] : Plenum Press, c1988 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[.] |
|
|
|
|
|
Descrizione fisica |
|
. - XII, 385 p. : ill. ; 23 cm |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910484649303321 |
|
|
Titolo |
Construction and Analysis of Safe, Secure, and Interoperable Smart Devices : International Workshop, CASSIS 2004, Marseille, France, March 10-14, 2004, Revised Selected Papers / / edited by Gilles Barthe, Lilian Burdy, Marieke Huisman, Jean-Louis Lanet, Traian Muntean |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2005.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (IX, 258 p.) |
|
|
|
|
|
|
Collana |
|
Security and Cryptology, , 2946-1863 ; ; 3362 |
|
|
|
|
|
|
Altri autori (Persone) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Cryptography |
Data encryption (Computer science) |
Software engineering |
Computers, Special purpose |
Computer programming |
Compilers (Computer programs) |
Operating systems (Computers) |
Cryptology |
Software Engineering |
Special Purpose and Application-Based Systems |
Programming Techniques |
|
|
|
|
|
|
|
|
|
|
|
|
Compilers and Interpreters |
Operating Systems |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Mobile Resource Guarantees for Smart Devices -- History-Based Access Control and Secure Information Flow -- The Spec# Programming System: An Overview -- Mastering Test Generation from Smart Card Software Formal Models -- A Mechanism for Secure, Fine-Grained Dynamic Provisioning of Applications on Small Devices -- ESC/Java2: Uniting ESC/Java and JML -- A Type System for Checking Applet Isolation in Java Card -- Verification of Safety Properties in the Presence of Transactions -- Modelling Mobility Aspects of Security Policies -- Smart Devices for Next Generation Mobile Services -- A Flexible Framework for the Estimation of Coverage Metrics in Explicit State Software Model Checking -- Combining Several Paradigms for Circuit Validation and Verification -- Smart Card Research Perspectives. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
This volume contains a selection of refereed papers from participants of the workshop "Construction and Analysis of Safe, Secure and Interoperable Smart Devices" (CASSIS), held from the 10th to the 13th March 2004 in Marseille, France: http://www-sop.inria.fr/everest/events/cassis04/ The workshop was organized by INRIA (Institut National de Recherche en InformatiqueetenAutomatique),Franceandthe UniversitydelaM´ editerran´ ee, Marseille, France. The workshop was attended by nearly 100 participants, who were invited for their contributions to relevant areas of computer science. Theaimoftheworkshopwastobringtogetherexpertsfromthesmartdevices industry and academic researchers, with a view to stimulate research on formal methods and security, and to encourage the smart device industry to adopt innovative solutions drawn from academic research. The next generation of smart devices holds the promise of providing the required infrastructure for the secure provision of multiple and personalized services. In order to deliver their promise, the smart device technology must however pursue the radical evolution that was initiated with the adoption of multi-application smartcards. Typical needs include: - The possibility for smart devices to feature extensible computational infr- tructures that may be enhanced to support increasingly complex appli- tions that may be installed post-issuance, and may require operating system functionalities that were not pre-installed. Such additional ?exibility must however not compromise security. - The possibility for smart devices to achieve a better integration with larger computersystems,throughimprovedconnectivity,genericity,aswellasint- operability. |
|
|
|
|
|
|
|
| |