top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Communicating Sequential Processes. The First 25 Years [[electronic resource] ] : Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers / / edited by Ali E. Abdallah, Cliff B. Jones, Jeff W. Sanders
Communicating Sequential Processes. The First 25 Years [[electronic resource] ] : Symposium on the Occasion of 25 Years of CSP, London, UK, July 7-8, 2004. Revised Invited Papers / / edited by Ali E. Abdallah, Cliff B. Jones, Jeff W. Sanders
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XIV, 326 p.)
Disciplina 005.13/3
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Compilers (Computer programs)
Software engineering
Computer programming
Computer Science Logic and Foundations of Programming
Compilers and Interpreters
Software Engineering
Programming Techniques
ISBN 3-540-32265-5
3-540-25813-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Semantic Foundations -- Retracing the Semantics of CSP -- Seeing Beyond Divergence -- Refinement and Simulation -- Process Algebra: A Unifying Approach -- Linking Theories of Concurrency -- Hardware Synthesis -- CSP, occam and Transputers -- Models for Data-Flow Sequential Processes -- Implementation of Handshake Components -- Transactions -- A Trace Semantics for Long-Running Transactions -- Practical Application of CSP and FDR to Software Design -- Concurrent Programming -- Communicating Mobile Processes -- Model-Based Design of Concurrent Programs -- Linking Theories -- Of Probabilistic wp and CSP—and Compositionality -- Order, Topology, and Recursion Induction in CSP -- Security -- Verifying Security Protocols: An Application of CSP -- Shedding Light on Haunted Corners of Information Security -- Automated Development and Model Checking -- Operational Semantics for Fun and Profit -- On Model Checking Data-Independent Systems with Arrays with Whole-Array Operations -- Industrial Strength CSP -- Industrial Strength CSP: Opportunities and Challenges in Model-Checking -- Applied Formal Methods – From CSP to Executable Hybrid Specifications.
Record Nr. UNISA-996465819603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Formal Aspects of Security [[electronic resource] ] : First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers / / edited by Ali E. Abdallah, Peter Ryan, Steve Schneider
Formal Aspects of Security [[electronic resource] ] : First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers / / edited by Ali E. Abdallah, Peter Ryan, Steve Schneider
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 246 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer communication systems
Data encryption (Computer science)
Software engineering
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Computer Communication Networks
Cryptology
Software Engineering
Operating Systems
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-40981-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems.
Record Nr. UNISA-996465921003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Formal Aspects of Security : First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers / / edited by Ali E. Abdallah, Peter Ryan, Steve Schneider
Formal Aspects of Security : First International Conference, FASec 2002, London, UK, December 16-18, 2002, Revised Papers / / edited by Ali E. Abdallah, Peter Ryan, Steve Schneider
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 246 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer communication systems
Data encryption (Computer science)
Software engineering
Operating systems (Computers)
Computers and civilization
Management information systems
Computer science
Computer Communication Networks
Cryptology
Software Engineering
Operating Systems
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-40981-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Keynote Talk -- Lifting Reference Monitors from the Kernel -- Invited Talks I -- Authenticity Types for Cryptographic Protocols -- Verifying the SET Protocol: Overview -- Protocol Verification -- Interacting State Machines: A Stateful Approach to Proving Security -- Automatic Approximation for the Verification of Cryptographic Protocols -- Towards a Formal Specification of the Bellare-Rogaway Model for Protocol Analysis -- Invited Talks II -- Critical Critical Systems -- Analysing Security Protocols -- Analysis of Protocols -- Analysis of Probabilistic Contract Signing -- Security Analysis of (Un-) Fair Non-repudiation Protocols -- Modeling Adversaries in a Logic for Security Protocol Analysis -- Security Modelling and Reasonning -- Secure Self-certified Code for Java -- Z Styles for Security Properties and Modern User Interfaces -- Invited Talks III -- Cryptographic Challenges: The Past and the Future -- TAPS: The Last Few Slides -- Intrusion Detection Systems and Liveness -- Formal Specification for Fast Automatic IDS Training -- Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area -- Revisiting Liveness Properties in the Context of Secure Systems.
Record Nr. UNINA-9910768436903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui