top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Trusted Systems [[electronic resource] ] : Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers / / edited by Liqun Chen, Moti Yung, Liehuang Zhu
Trusted Systems [[electronic resource] ] : Third International Conference, INTRUST 2011, Beijing, China, November 27-20, 2011, Revised Selected Papers / / edited by Liqun Chen, Moti Yung, Liehuang Zhu
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XII, 351 p. 77 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Computer networks
Computers and civilization
Information technology—Management
Data and Information Security
Cryptology
IT Operations
Computer Communication Networks
Computers and Society
Computer Application in Administrative Data Processing
ISBN 3-642-32298-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Flexible Software Development and Emulation Framework for ARM TrustZone -- Mass Transit Ticketing with NFC Mobile Phones --  Some Improvements to the Cost-Based Framework for Analyzing -- Denial of Service Attacks --  Fault Detection of the MacGuffin Cipher against Differential Fault Attack -- Computationally Sound Symbolic Analysis of EAP-TNC Protocol -- A Technique for Remote Detection of Certain Virtual Machine Monitors --  Indifferentiability of Domain Extension Modes for Hash Functions.
Record Nr. UNISA-996465758703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trusted Systems [[electronic resource] ] : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers / / edited by Liqun Chen, Moti Yung
Trusted Systems [[electronic resource] ] : Second International Conference, INTRUST 2010, Beijing, China, December 13-15, 2010, Revised Selected Papers / / edited by Liqun Chen, Moti Yung
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 362 p. 73 illus.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Computer networks
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Algorithms
Computers and civilization
Data protection
Computer Communication Networks
Cryptology
IT Operations
Computers and Society
Data and Information Security
ISBN 3-642-25283-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Intro -- Title -- Preface -- Table of Contents -- Implementation Technology -- Seamless Integration of Trusted Computing into Standard Cryptographic Frameworks -- Introduction -- Related Work -- Our Contribution and Background -- Architecture Overview -- Comparison to Classic TCG Trusted Software Stacks -- Connection and Context Setup -- Using the doTSS Client API -- System Implementation -- Server Architecture -- Client Architecture -- Client/Server Communication Protocol -- doTSS on Embedded Systems -- Conclusion and Future Work -- References -- Design and Implementation of Document Access Control Model Based on Role and Security Policy -- Introduction -- Background and Motivation -- Previous Works -- Challenging Issues -- Our Contributions -- XACML-RBAC Framework -- Document Access Control Model -- Security Requirements of Model -- Security Policy of the Model -- Static Security Rules -- Dynamic Security Rules -- Information Flow Analysis -- Document Access Control System -- Implementation -- Evaluation -- Conclusion and Future Work -- References -- Towards High-Performance IPsec on Cavium OCTEON Platform -- Introduction -- Background -- Cavium OCTEON -- Run-to-Completion vs Pipeline -- IPsec -- Encrypting Algorithms -- IPsec Implementation -- OUTBOUND Design -- INBOUND Design -- Performance Evaluation -- Development Platform and Test Environments -- Experiment on Different Encryption Algorithms and Packet Length -- Experiment on Different Core Numbers -- Experiment on Pipeline and Run-to-Completion Mechanism -- Conclusion -- References -- Security Analysis -- An Abstract Model of a Trusted Platform -- Introduction -- Trusted Computing -- Trusted Platforms -- The Need for Reasoning about Platform Properties -- A CSP Primer -- Why CSP -- An Abstract Model -- Runtime System -- Resources -- Applications -- Platform Configurations.
Platform Instantiation and Property Verification -- Initial Memory Contents -- Component Location Configuration -- Application Logic -- Property Specification and Verification -- Case Study: Cooper's Trusted Grid Platform -- Property Specification -- Common Setup -- Instantiating a Malicious Platform -- Instantiating a Non-malicious Platform -- Property Verification, Results and Discussion -- Performance Results -- Observations -- Application Specification -- Extending Configurations -- State Space Reduction -- Performance and Scalability of the Model -- Related Work -- Conclusion and Future Work -- References -- Modeling TCG-Based Secure Systems with Colored Petri Nets -- Introduction -- Preliminaries -- Trusted Computing -- Colored Petri Nets -- Modeling TCG-Based Secure Systems with CPN -- Basic Model -- Process Management -- Synchronous I/O -- Data Management -- Late Launch -- Case Studies -- Memory Protection in TrustVisor -- Remote Attestation Based on Dynamic Root of Trust -- Related Work -- Secure Systems Based on Trusted Computing -- CPN Based Formal Studies -- Formal Verification on Trusted Computing -- Conclusion -- References -- Information Flow Graph: An Approach to Identifying Covert Storage Channels -- Introduction -- The Information Flow Graph Approach -- Graph Notation and Semantics -- Constructing An Information Flow Graph -- Pruning the Information Flow Graph -- Searching for Information Flow Paths -- Analyzing Operation Sequences -- Example Analyses Using Information Flow Graph -- A Brief Description of the File System Example -- Example Information Flow Graph and Scenario List for File System Example -- Comparison of IFG, CFT and SRM Analyses for the File System Example -- Comparison among SRM, CFT and IFG -- Conclusion and Future Work -- References -- Trusted Subjects Configuration Based on TE Model in MLS Systems.
Introduction -- Related Works -- Trusted Subjects Configuration -- Notation for Trusted Subject -- Information Flow Graph -- MLS Policy Information Flow Graph -- Type Enforcement Policy and Entity Information Flow Graph -- Determine the Trusted Subjects -- Security Label Range of Trusted Subjects -- Risk Information Flow Graph -- Risk of Trusted Subjects -- Risk Security -- The Assurance Requirements of Trusted Subjects -- Conclusions -- References -- Cryptographic Aspects (I) -- Key Exchange with Anonymous Authentication Using DAA-SIGMA Protocol -- Introduction -- Our Contribution -- Related Work -- Organization of the Paper -- Background and Building Blocks -- Notations -- Review of DAA -- Review of SIGMA Key Exchange Protocol -- Security Model -- Review of Canetti-Krawczyk Key Exchange Model -- Security Model for Key Exchange with Anonymous Authentication -- Proposed DAA-SIGMA Protocol -- Security Proof of the DAA-SIGMA Protocol -- Proof of Property P1 -- Proof of Property P2 -- Discussions and Extensions -- Using Group Signatures Instead of DAA -- Use Certificates Instead of Identities -- Supporting User-Controlled-Traceability and DAA Revocation -- Mutual Anonymous Authentication Using DAA -- Conclusions and Future Work -- References -- Revocation of Direct Anonymous Attestation -- Introduction -- General Concept of DAA Revocation -- Two Approaches -- Security Properties -- Review Three Types of DAA Schemes -- The RSA-DAA Scheme -- The LRSW-DAA Schemes -- The SDH-DAA Schemes -- Review of the Existing Revocation Solutions -- Rekey-Based Revocation -- An Overview -- Rekey in the RSA-DAA Scheme -- Rekey in the LRSW-DAA Schemes -- Rekey in the SDH-DAA Schemes -- Verifier-Local Revocation -- An Overview -- New VLR in the RSA-DAA Scheme -- New VLR in the SDH-DAA Schemes -- Comparisons and Discussions -- Performance Measurement.
Comparisons of VLR Methods -- Comparisons between Rekey and VLR Methods -- Using Rekey and VLR Approaches Together -- Conclusions -- References -- Measuring Random Tests by Conditional Entropy and Optimal Execution Order -- Introduction -- Preliminaries -- Principle of a Statistical Test -- NIST Random Test Package -- The Conditional Entropy of the Tests -- The Application of the Entropy -- The Result and Analysis -- The Order of the Tests' Execution -- The Way to Decide the Execution Order -- The Result and Analysis -- Conclusion -- References -- Cryptographic Aspects (II) -- Leakage Resilient Strong Key-Insulated Signatures in Public Channel -- Introduction -- Our Contribution -- Definitions -- Some Impossibility Results -- Our Proposal -- A Concrete Instantiation -- References -- Two-Head Dragon Protocol: Preventing Cloning of Signature Keys -- Introduction -- Previous Work -- Preliminaries -- A Simple Solution -- Target Application Area -- Two-Head Dragon Protocol -- Preliminaries -- Card Deployment -- Signature Creation and Verification -- Situation of an Adversary -- Security Considerations -- Remarks on Cloning Assumptions -- Composition Issues -- Final Remarks -- Further Applications -- Conclusion -- References -- Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing -- Introduction -- Preliminaries -- Model of Unidirectional Proxy Re-encryption -- Review of Chow et al.'s Scheme -- Our Method -- Overview of the Method -- Modifying Chow et al.'s Scheme -- Details of Our Method -- Security Analysis -- Discussions -- Conclusion -- References -- Mobile Trusted Systems -- Can Hand-Held Computers Still Be Better Smart Cards? -- Introduction -- System Requirements and Use Cases -- Background -- Standards in the Field -- Trusted Hardware -- Architecture.
Host Computer Smart Card Middlewares and Smart Card Filesystem -- Smart Card Provisioning Server -- Credential Life-Cycle -- Implementation -- Speed Measurements -- Security Analysis -- Related Work -- Conclusions and Future Work -- References -- TruWalletM: Secure Web Authentication on Mobile Platforms -- Introduction -- Model and Requirement Analysis -- Architecture and Design Decisions -- Design Decisions -- Architecture -- Use Cases and Protocols -- Establishing SSL/TLS Connection and Managing Two Logical SSL/TLS Subchannels -- TruWalletM Initialization -- Registration -- Login -- Password Change -- Implementation -- Security Considerations -- Related Work -- Conclusion and Future Work -- References -- A Game Theory-Based Surveillance Mechanism against Suspicious Insiders in MANETs -- Introduction -- Background and Motivation -- Related Works -- Challenging Issues -- Our Contributions -- Threat Analysis -- Reputation Mechanism -- Misbehavior Prediction -- Surveillance Game -- Multilevel Surveillance -- Reward and Punishment Scheme -- Surveillance Game Model -- Game Solutions -- Decision Making -- Case Study -- Conclusion -- References -- Hardware Security -- Hardware Trojans for Inducing or Amplifying Side-Channel Leakage of Cryptographic Software -- Introduction -- Preliminaries and Related Work -- Bug Attacks -- Micro-Architectural Side-Channels -- Fault Attacks -- Activation Mechanisms -- Method 1: Snooping the Data Bus -- Method 2: Snooping Operands of Instructions -- Effects of the Trojan -- Fault Induction -- Timing Variation -- Variation of Power Consumption -- Case Studies -- Attacking AES -- Attacking RSA -- Conclusions -- References -- An Emerging Threat: Eve Meets a Robot -- Introduction -- What is a Robot? -- Security of Robotics -- A Simple Active Attack and a Countermeasure -- Active Attacks on Robots.
Information Leakage Attacks on Robots.
Record Nr. UNISA-996465682303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trusted Systems [[electronic resource] ] : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings / / edited by Liqun Chen, Moti Yung
Trusted Systems [[electronic resource] ] : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings / / edited by Liqun Chen, Moti Yung
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIV, 263 p. 64 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer science
Computer networks
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Algorithms
Computers and civilization
Theory of Computation
Computer Communication Networks
Cryptology
IT Operations
Computers and Society
ISBN 1-280-38811-0
9786613566034
3-642-14597-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains – Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis.
Record Nr. UNISA-996465788903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trusted Systems [[electronic resource] ] : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings / / edited by Liqun Chen, Moti Yung
Trusted Systems [[electronic resource] ] : First International Conference, INTRUST 2009, Beijing, China, December 17-19, 2009. Proceedings / / edited by Liqun Chen, Moti Yung
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIV, 263 p. 64 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer science
Computer networks
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Algorithms
Computers and civilization
Theory of Computation
Computer Communication Networks
Cryptology
IT Operations
Computers and Society
ISBN 1-280-38811-0
9786613566034
3-642-14597-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- On Design of a Trusted Software Base with Support of TPCM -- Secure Storage -- External Authenticated Non-volatile Memory with Lifecycle Management for State Protection in Trusted Computing -- A Method for Safekeeping Cryptographic Keys from Memory Disclosure Attacks -- Attestation -- Remote Attestation on Function Execution (Work-in-Progress) -- Scalable Remote Attestation with Privacy Protection -- Anonymous Credentials for Java Enabled Platforms: A Performance Evaluation -- Trusted Network -- SocialClouds: Concept, Security Architecture and Some Mechanisms -- Privacy Enhanced Trusted Network Connect -- Research on Multistage Interconnection Architecture and Collision Detection Model -- Virtualization -- Trusted Virtual Domains – Design, Implementation and Lessons Learned -- Trusted Integrity Measurement and Reporting for Virtualized Platforms -- Applications -- A Feather-Weight Application Isolation Model -- Exploring Trust of Mobile Applications Based on User Behaviors -- Trusted Firmware Services Based on TPM -- Supporting Technology -- Improved Cryptanalysis of the FOX Block Cipher -- Bitwise Higher Order Differential Cryptanalysis.
Record Nr. UNINA-9910484457503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trustworthy Global Computing [[electronic resource] ] : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / / edited by Catuscia Palamidessi, Mark D. Ryan
Trustworthy Global Computing [[electronic resource] ] : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / / edited by Catuscia Palamidessi, Mark D. Ryan
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 213 p. 37 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Algorithms
Software engineering
Coding theory
Information theory
Cryptology
Computer Communication Networks
IT Operations
Software Engineering
Coding and Information Theory
ISBN 3-642-41157-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From Rational Number Reconstruction to Set Reconciliation and File Synchronization -- Affine Refinement Types for Authentication and Authorization -- Seamless Distributed Computing from the Geometry of Interaction -- A Beginner’s Guide to the DeadLock Analysis Model -- Formal Modeling and Reasoning about the Android Security Framework -- A Type System for Flexible Role Assignment in Multiparty Communicating Systems -- A Multiparty Multi-session Logic -- LTS Semantics for Compensation-Based Processes -- Linking Unlinkability -- Towards Quantitative Analysis of Opacity -- An Algebra for Symbolic Diffie-Hellman Protocol Analysis -- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability -- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus.
Record Nr. UNISA-996465552703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trustworthy Global Computing [[electronic resource] ] : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / / edited by Catuscia Palamidessi, Mark D. Ryan
Trustworthy Global Computing [[electronic resource] ] : 7th International Symposium, TGC 2012, Newcastle upon Tyne, UK, September 7-8, 2012, Revised Selected Papers / / edited by Catuscia Palamidessi, Mark D. Ryan
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (X, 213 p. 37 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Algorithms
Software engineering
Coding theory
Information theory
Cryptology
Computer Communication Networks
IT Operations
Software Engineering
Coding and Information Theory
ISBN 3-642-41157-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From Rational Number Reconstruction to Set Reconciliation and File Synchronization -- Affine Refinement Types for Authentication and Authorization -- Seamless Distributed Computing from the Geometry of Interaction -- A Beginner’s Guide to the DeadLock Analysis Model -- Formal Modeling and Reasoning about the Android Security Framework -- A Type System for Flexible Role Assignment in Multiparty Communicating Systems -- A Multiparty Multi-session Logic -- LTS Semantics for Compensation-Based Processes -- Linking Unlinkability -- Towards Quantitative Analysis of Opacity -- An Algebra for Symbolic Diffie-Hellman Protocol Analysis -- Security Analysis in Probabilistic Distributed Protocols via Bounded Reachability -- Modular Reasoning about Differential Privacy in a Probabilistic Process Calculus.
Record Nr. UNINA-9910482992403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Trustworthy Global Computing [[electronic resource] ] : 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers / / edited by Roberto Bruni, Vladimiro Sassone
Trustworthy Global Computing [[electronic resource] ] : 6th International Symposium, TGC 2011, Aachen, Germany, June 9-10, 2011. Revised Selected Papers / / edited by Roberto Bruni, Vladimiro Sassone
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 243 p. 54 illus.)
Disciplina 005.82
Collana Theoretical Computer Science and General Issues
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Algorithms
Software engineering
Coding theory
Information theory
Cryptology
Computer Communication Networks
IT Operations
Software Engineering
Coding and Information Theory
ISBN 3-642-30065-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465393803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trustworthy Global Computing [[electronic resource] ] : 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers / / edited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer
Trustworthy Global Computing [[electronic resource] ] : 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers / / edited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 380 p. 72 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Algorithms
Software engineering
Coding theory
Information theory
Cryptology
Computer Communication Networks
IT Operations
Software Engineering
Coding and Information Theory
ISBN 1-280-38883-8
9786613566751
3-642-15640-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode -- Perspectives in Certificate Translation -- Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Processes -- Toward a Game-Theoretic Model of Grid Systems -- Functions as Processes: Termination and the -Calculus -- Predicate Encryption for Secure Remote Storage -- Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols -- Types and Processes -- Expressiveness of Generic Process Shape Types -- A Java Inspired Semantics for Transactions in SOC -- Responsive Choice in Mobile Processes -- A Model of Evolvable Components -- Games and Concurrent Systems -- The Impact of Altruism on the Efficiency of Atomic Congestion Games -- Stressed Web Environments as Strategic Games: Risk Profiles and Weltanschauung -- An Algebra of Hierarchical Graphs -- Property-Preserving Refinement of Concurrent Systems -- Certification of Correctness -- Certificate Translation for the Verification of Concurrent Programs -- Certified Result Checking for Polyhedral Analysis of Bytecode Programs -- Tools and Languages -- A Novel Resource-Driven Job Allocation Scheme for Desktop Grid Environments -- A Framework for Rule-Based Dynamic Adaptation -- CarPal: Interconnecting Overlay Networks for a Community-Driven Shared Mobility -- Refactoring Long Running Transactions: A Case Study -- Probabilistic Aspects -- Approximate Model Checking of Stochastic COWS -- Probabilistic Aspects: Checking Security in an Imperfect World -- A Tool for Checking Probabilistic Properties of COWS Services.
Record Nr. UNISA-996465907903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trustworthy Global Computing [[electronic resource] ] : 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers / / edited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer
Trustworthy Global Computing [[electronic resource] ] : 5th International Symposium, TGC 2010, Munich, Germany, February 24-26, 2010, Revised Selected Papers / / edited by Martin Wirsing, Martin Hofmann, Axel Rauschmayer
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XII, 380 p. 72 illus.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Electronic data processing—Management
Algorithms
Software engineering
Coding theory
Information theory
Cryptology
Computer Communication Networks
IT Operations
Software Engineering
Coding and Information Theory
ISBN 1-280-38883-8
9786613566751
3-642-15640-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Symbolic and Analytic Techniques for Resource Analysis of Java Bytecode -- Perspectives in Certificate Translation -- Uniform Labeled Transition Systems for Nondeterministic, Probabilistic, and Stochastic Processes -- Toward a Game-Theoretic Model of Grid Systems -- Functions as Processes: Termination and the -Calculus -- Predicate Encryption for Secure Remote Storage -- Trust in Crowds: Probabilistic Behaviour in Anonymity Protocols -- Types and Processes -- Expressiveness of Generic Process Shape Types -- A Java Inspired Semantics for Transactions in SOC -- Responsive Choice in Mobile Processes -- A Model of Evolvable Components -- Games and Concurrent Systems -- The Impact of Altruism on the Efficiency of Atomic Congestion Games -- Stressed Web Environments as Strategic Games: Risk Profiles and Weltanschauung -- An Algebra of Hierarchical Graphs -- Property-Preserving Refinement of Concurrent Systems -- Certification of Correctness -- Certificate Translation for the Verification of Concurrent Programs -- Certified Result Checking for Polyhedral Analysis of Bytecode Programs -- Tools and Languages -- A Novel Resource-Driven Job Allocation Scheme for Desktop Grid Environments -- A Framework for Rule-Based Dynamic Adaptation -- CarPal: Interconnecting Overlay Networks for a Community-Driven Shared Mobility -- Refactoring Long Running Transactions: A Case Study -- Probabilistic Aspects -- Approximate Model Checking of Stochastic COWS -- Probabilistic Aspects: Checking Security in an Imperfect World -- A Tool for Checking Probabilistic Properties of COWS Services.
Record Nr. UNINA-9910484197103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Unconventional Computation and Natural Computation [[electronic resource] ] : 16th International Conference, UCNC 2017, Fayetteville, AR, USA, June 5-9, 2017, Proceedings / / edited by Matthew J. Patitz, Mike Stannett
Unconventional Computation and Natural Computation [[electronic resource] ] : 16th International Conference, UCNC 2017, Fayetteville, AR, USA, June 5-9, 2017, Proceedings / / edited by Matthew J. Patitz, Mike Stannett
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XVIII, 221 p. 89 illus.)
Disciplina 004
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Software engineering
Artificial intelligence
Electronic data processing—Management
Computer Science Logic and Foundations of Programming
Software Engineering
Artificial Intelligence
IT Operations
ISBN 3-319-58187-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto The Power of Analogue-digital Machines -- Ways to Compute in Euclidean Frameworks. - Real-Time Computability of Real Numbers by Chemical Reaction Networks -- Temporal logic computation using DNA strand displacement reactions -- Quantum-dot Cellular Automata: a Clocked Architecture for High-speed, Energy-efficient Molecular Computing -- Platform color designs for interactive molecular arrangements -- Self-Assembly of Shapes at Constant Scale using Repulsive Forces -- Verification in Staged Tile Self-Assembly.-Self-Assembly of 4-sided Fractals in the Two-handed Tile Assembly Model.-Self-Assembled DC Resistive Circuits with Voltage Controlled Growth -- Morphogenetic and Homeostatic Self-Assembled Systems -- Superposition as memory: unlocking quantum automatic complexity -- Solving the Bin-Packing Problem by Means of Tissue P System with 2-Division -- Universal Matrix Insertion Grammars with Small Size -- Analysis on the Nested Duplication String System and Its Capacity -- Descrambling Order Analysis in Ciliates.
Record Nr. UNISA-996466232703316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui