top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
FM 2008 : formal methods : 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 : proceedings / / Jorge Cuellar, Tom Maibaum, Kaisa Sere (eds.)
FM 2008 : formal methods : 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 : proceedings / / Jorge Cuellar, Tom Maibaum, Kaisa Sere (eds.)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2008
Descrizione fisica 1 online resource (XIII, 436 p.)
Disciplina 005.1
Altri autori (Persone) CuellarJorge
MaibaumThomas S. E. <1947->
SereK <1954-> (Kaisa)
Collana Lecture notes in computer science
LNCS sublibrary. SL 2, Programming and software engineering
LNCS SL2
Soggetto topico Computer software - Development
Formal methods (Computer science)
System design - Mathematics
ISBN 3-540-68237-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1. Invited Talks -- Aspects and Formal Methods -- Getting Formal Verification into Design Flow -- Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems -- Simulation, Orchestration and Logical Clocks -- Session 2. Programming Language Analysis -- CoVaC: Compiler Validation by Program Analysis of the Cross-Product -- Lazy Behavioral Subtyping -- Checking Well-Formedness of Pure-Method Specifications -- Session 3. Verification -- Verifying Dynamic Pointer-Manipulating Threads -- Proofs and Refutations for Probabilistic Refinement -- Assume-Guarantee Verification for Interface Automata -- Session 4. Real-Time and Concurrency -- Automated Verification of Dense-Time MTL Specifications Via Discrete-Time Approximation -- A Model Checking Language for Concurrent Value-Passing Systems -- Session 5. Grand Chellenge Problems -- Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code -- Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM -- Session 6. FM Practice -- Industrial Use of Formal Methods for a High-Level Security Evaluation -- Secret Ninja Formal Methods -- Specification and Checking of Software Contracts for Conditional Information Flow -- Session 7. Runtime Moitoring and Analysis -- JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity -- Provably Correct Runtime Monitoring -- Session 8. Communication -- A Schedulerless Semantics of TLM Models Written in SystemC Via Translation into LOTOS -- A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service -- Session 9. Constraint Analysis -- Constraint Prioritization for Efficient Analysis of Declarative Models -- Finding Minimal Unsatisfiable Cores of Declarative Specifications -- Precise Interval Analysis vs. Parity Games -- Session 10. Design -- Introducing Objects through Refinement -- Masking Faults While Providing Bounded-Time Phased Recovery -- Towards Consistent Specifications of Product Families -- Session 11. Industry Day -- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution -- An Industrial Case: Pitfalls and Benefits of Applying Formal Methods to the Development of a Network-Centric RTOS -- Software Engineering with Formal Methods: Experiences with the Development of a Storm Surge Barrier Control System -- Application of a Formal Specification Language in the Development of the “Mobile FeliCa” IC Chip Firmware for Embedding in Mobile Phone -- Safe and Reliable Metro Platform Screen Doors Control/Command Systems.
Record Nr. UNINA-9910768444003321
Berlin ; ; New York, : Springer, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
FM 2008: Formal Methods [[electronic resource] ] : 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008, Proceedings / / edited by Jorge Cuellar, Tom Maibaum
FM 2008: Formal Methods [[electronic resource] ] : 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008, Proceedings / / edited by Jorge Cuellar, Tom Maibaum
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XIII, 436 p.)
Disciplina 005.1
Collana Programming and Software Engineering
Soggetto topico Software engineering
Computer engineering
Computer programming
Computer logic
Programming languages (Electronic computers)
Software Engineering/Programming and Operating Systems
Computer Engineering
Programming Techniques
Software Engineering
Logics and Meanings of Programs
Programming Languages, Compilers, Interpreters
ISBN 3-540-68237-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1. Invited Talks -- Aspects and Formal Methods -- Getting Formal Verification into Design Flow -- Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems -- Simulation, Orchestration and Logical Clocks -- Session 2. Programming Language Analysis -- CoVaC: Compiler Validation by Program Analysis of the Cross-Product -- Lazy Behavioral Subtyping -- Checking Well-Formedness of Pure-Method Specifications -- Session 3. Verification -- Verifying Dynamic Pointer-Manipulating Threads -- Proofs and Refutations for Probabilistic Refinement -- Assume-Guarantee Verification for Interface Automata -- Session 4. Real-Time and Concurrency -- Automated Verification of Dense-Time MTL Specifications Via Discrete-Time Approximation -- A Model Checking Language for Concurrent Value-Passing Systems -- Session 5. Grand Chellenge Problems -- Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code -- Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM -- Session 6. FM Practice -- Industrial Use of Formal Methods for a High-Level Security Evaluation -- Secret Ninja Formal Methods -- Specification and Checking of Software Contracts for Conditional Information Flow -- Session 7. Runtime Moitoring and Analysis -- JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity -- Provably Correct Runtime Monitoring -- Session 8. Communication -- A Schedulerless Semantics of TLM Models Written in SystemC Via Translation into LOTOS -- A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service -- Session 9. Constraint Analysis -- Constraint Prioritization for Efficient Analysis of Declarative Models -- Finding Minimal Unsatisfiable Cores of Declarative Specifications -- Precise Interval Analysis vs. Parity Games -- Session 10. Design -- Introducing Objects through Refinement -- Masking Faults While Providing Bounded-Time Phased Recovery -- Towards Consistent Specifications of Product Families -- Session 11. Industry Day -- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution -- An Industrial Case: Pitfalls and Benefits of Applying Formal Methods to the Development of a Network-Centric RTOS -- Software Engineering with Formal Methods: Experiences with the Development of a Storm Surge Barrier Control System -- Application of a Formal Specification Language in the Development of the “Mobile FeliCa” IC Chip Firmware for Embedding in Mobile Phone -- Safe and Reliable Metro Platform Screen Doors Control/Command Systems.
Record Nr. UNISA-996465640803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Location privacy in wireless sensor networks / / Ruben Rios, Javier Lopez, and Jorge Cuellar
Location privacy in wireless sensor networks / / Ruben Rios, Javier Lopez, and Jorge Cuellar
Autore Rios Ruben <1983, >
Pubbl/distr/stampa Boca Raton : , : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, , [2017]
Descrizione fisica 1 online resource (194 pages) : illustrations
Disciplina 621.3841/92
Collana Series in Security, Privacy, and Trust
Soggetto topico Location-based services - Security measures
Internet of things - Security measures
Wireless sensor networks - Security measures
ISBN 1-315-36693-2
1-315-34982-5
1-4987-7634-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. Introduction -- 2. Suitability of computer-based anonymity systems -- 3. Analysis of location privacy solutions in WSNs -- 4. Context-aware source-location privacy -- 5. Probabilistic reciever-location privacy -- 6. Conclusion.
Record Nr. UNINA-9910149365003321
Rios Ruben <1983, >  
Boca Raton : , : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, , [2017]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security and Trust Management [[electronic resource] ] : 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers / / edited by Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner
Security and Trust Management [[electronic resource] ] : 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers / / edited by Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (X, 271 p.)
Disciplina 005.74
Collana Security and Cryptology
Soggetto topico Management information systems
Computer science
Data encryption (Computer science)
Operating systems (Computers)
Computer communication systems
Computers and civilization
Management of Computing and Information Systems
Cryptology
Operating Systems
Computer Communication Networks
Computers and Society
ISBN 3-642-22444-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465397203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Grid Security [[electronic resource] ] : Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers / / edited by Jorge Cuellar
Smart Grid Security [[electronic resource] ] : Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers / / edited by Jorge Cuellar
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 193 p. 50 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
Management information systems
Computer science
Operating systems (Computers)
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Operating Systems
ISBN 3-319-10329-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Privacy in Smart Grid Demand Response Systems -- Distributed MILS Architectural Approach for Secure Smart Grids -- Determining the Probability of Smart Grid Attacks by Combining -- Attack Tree and Attack Graph Analysis -- Selective release of smart metering data in multi-domain smart grids -- Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid -- A Threat Analysis Methodology for Smart Home Scenarios -- A Privacy-friendly Framework for Vehicle-to-Grid Interactions -- Reactive Security for Smart Grids -- Privacy in Residential Demand Side Management Applications -- Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements -- CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot.
Record Nr. UNISA-996198263303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Grid Security : Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers / / edited by Jorge Cuellar
Smart Grid Security : Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers / / edited by Jorge Cuellar
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (X, 193 p. 50 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
Management information systems
Computer science
Operating systems (Computers)
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Operating Systems
ISBN 3-319-10329-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Security and Privacy in Smart Grid Demand Response Systems -- Distributed MILS Architectural Approach for Secure Smart Grids -- Determining the Probability of Smart Grid Attacks by Combining -- Attack Tree and Attack Graph Analysis -- Selective release of smart metering data in multi-domain smart grids -- Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid -- A Threat Analysis Methodology for Smart Home Scenarios -- A Privacy-friendly Framework for Vehicle-to-Grid Interactions -- Reactive Security for Smart Grids -- Privacy in Residential Demand Side Management Applications -- Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements -- CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot.
Record Nr. UNINA-9910483988403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Smart Grid Security [[electronic resource] ] : First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers / / edited by Jorge Cuellar
Smart Grid Security [[electronic resource] ] : First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers / / edited by Jorge Cuellar
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (VIII, 151 p. 39 illus.)
Disciplina 005.43
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
Management information systems
Computer science
Operating systems (Computers)
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Operating Systems
ISBN 3-642-38030-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- IT Security Architecture Approaches for Smart Metering and Smart Grid -- Smart Grid Information Exchange – Securing the Smart Grid from the Ground -- A Tool Set for the Evaluation of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues in Smart Grids -- Hardware Security for Device Authentication in the Smart Grid -- Maintaining Privacy in Data Rich Demand Response Applications -- Data Protection in a Cloud-Enabled Smart Grid -- Formal Analysis of a Privacy-Preserving Billing Protocol -- Privacy in Smart Metering Ecosystems -- Energy@home Leveraging ZigBee to Enable Smart Grid in Residential Environment.
Record Nr. UNISA-996466176703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Smart Grid Security : First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers / / edited by Jorge Cuellar
Smart Grid Security : First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers / / edited by Jorge Cuellar
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (VIII, 151 p. 39 illus.)
Disciplina 005.43
Collana Security and Cryptology
Soggetto topico Computer security
Computers and civilization
Management information systems
Computer science
Operating systems (Computers)
Systems and Data Security
Computers and Society
Management of Computing and Information Systems
Operating Systems
ISBN 3-642-38030-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Papers -- IT Security Architecture Approaches for Smart Metering and Smart Grid -- Smart Grid Information Exchange – Securing the Smart Grid from the Ground -- A Tool Set for the Evaluation of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues in Smart Grids -- Hardware Security for Device Authentication in the Smart Grid -- Maintaining Privacy in Data Rich Demand Response Applications -- Data Protection in a Cloud-Enabled Smart Grid -- Formal Analysis of a Privacy-Preserving Billing Protocol -- Privacy in Smart Metering Ecosystems -- Energy@home Leveraging ZigBee to Enable Smart Grid in Residential Environment.
Record Nr. UNINA-9910484268603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui