FM 2008 : formal methods : 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008 : proceedings / / Jorge Cuellar, Tom Maibaum, Kaisa Sere (eds.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2008 |
Descrizione fisica | 1 online resource (XIII, 436 p.) |
Disciplina | 005.1 |
Altri autori (Persone) |
CuellarJorge
MaibaumThomas S. E. <1947-> SereK <1954-> (Kaisa) |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 2, Programming and software engineering LNCS SL2 |
Soggetto topico |
Computer software - Development
Formal methods (Computer science) System design - Mathematics |
ISBN | 3-540-68237-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1. Invited Talks -- Aspects and Formal Methods -- Getting Formal Verification into Design Flow -- Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems -- Simulation, Orchestration and Logical Clocks -- Session 2. Programming Language Analysis -- CoVaC: Compiler Validation by Program Analysis of the Cross-Product -- Lazy Behavioral Subtyping -- Checking Well-Formedness of Pure-Method Specifications -- Session 3. Verification -- Verifying Dynamic Pointer-Manipulating Threads -- Proofs and Refutations for Probabilistic Refinement -- Assume-Guarantee Verification for Interface Automata -- Session 4. Real-Time and Concurrency -- Automated Verification of Dense-Time MTL Specifications Via Discrete-Time Approximation -- A Model Checking Language for Concurrent Value-Passing Systems -- Session 5. Grand Chellenge Problems -- Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code -- Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM -- Session 6. FM Practice -- Industrial Use of Formal Methods for a High-Level Security Evaluation -- Secret Ninja Formal Methods -- Specification and Checking of Software Contracts for Conditional Information Flow -- Session 7. Runtime Moitoring and Analysis -- JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity -- Provably Correct Runtime Monitoring -- Session 8. Communication -- A Schedulerless Semantics of TLM Models Written in SystemC Via Translation into LOTOS -- A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service -- Session 9. Constraint Analysis -- Constraint Prioritization for Efficient Analysis of Declarative Models -- Finding Minimal Unsatisfiable Cores of Declarative Specifications -- Precise Interval Analysis vs. Parity Games -- Session 10. Design -- Introducing Objects through Refinement -- Masking Faults While Providing Bounded-Time Phased Recovery -- Towards Consistent Specifications of Product Families -- Session 11. Industry Day -- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution -- An Industrial Case: Pitfalls and Benefits of Applying Formal Methods to the Development of a Network-Centric RTOS -- Software Engineering with Formal Methods: Experiences with the Development of a Storm Surge Barrier Control System -- Application of a Formal Specification Language in the Development of the “Mobile FeliCa” IC Chip Firmware for Embedding in Mobile Phone -- Safe and Reliable Metro Platform Screen Doors Control/Command Systems. |
Record Nr. | UNINA-9910768444003321 |
Berlin ; ; New York, : Springer, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
FM 2008: Formal Methods [[electronic resource] ] : 15th International Symposium on Formal Methods, Turku, Finland, May 26-30, 2008, Proceedings / / edited by Jorge Cuellar, Tom Maibaum |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
Descrizione fisica | 1 online resource (XIII, 436 p.) |
Disciplina | 005.1 |
Collana | Programming and Software Engineering |
Soggetto topico |
Software engineering
Computer engineering Computer programming Computer logic Programming languages (Electronic computers) Software Engineering/Programming and Operating Systems Computer Engineering Programming Techniques Software Engineering Logics and Meanings of Programs Programming Languages, Compilers, Interpreters |
ISBN | 3-540-68237-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1. Invited Talks -- Aspects and Formal Methods -- Getting Formal Verification into Design Flow -- Lessons in the Weird and Unexpected: Some Experiences from Checking Large Real Systems -- Simulation, Orchestration and Logical Clocks -- Session 2. Programming Language Analysis -- CoVaC: Compiler Validation by Program Analysis of the Cross-Product -- Lazy Behavioral Subtyping -- Checking Well-Formedness of Pure-Method Specifications -- Session 3. Verification -- Verifying Dynamic Pointer-Manipulating Threads -- Proofs and Refutations for Probabilistic Refinement -- Assume-Guarantee Verification for Interface Automata -- Session 4. Real-Time and Concurrency -- Automated Verification of Dense-Time MTL Specifications Via Discrete-Time Approximation -- A Model Checking Language for Concurrent Value-Passing Systems -- Session 5. Grand Chellenge Problems -- Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code -- Incremental Development of a Distributed Real-Time Model of a Cardiac Pacing System Using VDM -- Session 6. FM Practice -- Industrial Use of Formal Methods for a High-Level Security Evaluation -- Secret Ninja Formal Methods -- Specification and Checking of Software Contracts for Conditional Information Flow -- Session 7. Runtime Moitoring and Analysis -- JML Runtime Assertion Checking: Improved Error Reporting and Efficiency Using Strong Validity -- Provably Correct Runtime Monitoring -- Session 8. Communication -- A Schedulerless Semantics of TLM Models Written in SystemC Via Translation into LOTOS -- A Rigorous Approach to Networking: TCP, from Implementation to Protocol to Service -- Session 9. Constraint Analysis -- Constraint Prioritization for Efficient Analysis of Declarative Models -- Finding Minimal Unsatisfiable Cores of Declarative Specifications -- Precise Interval Analysis vs. Parity Games -- Session 10. Design -- Introducing Objects through Refinement -- Masking Faults While Providing Bounded-Time Phased Recovery -- Towards Consistent Specifications of Product Families -- Session 11. Industry Day -- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution -- An Industrial Case: Pitfalls and Benefits of Applying Formal Methods to the Development of a Network-Centric RTOS -- Software Engineering with Formal Methods: Experiences with the Development of a Storm Surge Barrier Control System -- Application of a Formal Specification Language in the Development of the “Mobile FeliCa” IC Chip Firmware for Embedding in Mobile Phone -- Safe and Reliable Metro Platform Screen Doors Control/Command Systems. |
Record Nr. | UNISA-996465640803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Location privacy in wireless sensor networks / / Ruben Rios, Javier Lopez, and Jorge Cuellar |
Autore | Rios Ruben <1983, > |
Pubbl/distr/stampa | Boca Raton : , : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, , [2017] |
Descrizione fisica | 1 online resource (194 pages) : illustrations |
Disciplina | 621.3841/92 |
Collana | Series in Security, Privacy, and Trust |
Soggetto topico |
Location-based services - Security measures
Internet of things - Security measures Wireless sensor networks - Security measures |
ISBN |
1-315-36693-2
1-315-34982-5 1-4987-7634-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1. Introduction -- 2. Suitability of computer-based anonymity systems -- 3. Analysis of location privacy solutions in WSNs -- 4. Context-aware source-location privacy -- 5. Probabilistic reciever-location privacy -- 6. Conclusion. |
Record Nr. | UNINA-9910149365003321 |
Rios Ruben <1983, > | ||
Boca Raton : , : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, , [2017] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Security and Trust Management [[electronic resource] ] : 6th International Workshop, STM 2010, Athens, Greece, September 23-24, 2010, Revised Selected Papers / / edited by Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (X, 271 p.) |
Disciplina | 005.74 |
Collana | Security and Cryptology |
Soggetto topico |
Management information systems
Computer science Data encryption (Computer science) Operating systems (Computers) Computer communication systems Computers and civilization Management of Computing and Information Systems Cryptology Operating Systems Computer Communication Networks Computers and Society |
ISBN | 3-642-22444-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465397203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Grid Security [[electronic resource] ] : Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers / / edited by Jorge Cuellar |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 193 p. 50 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization Management information systems Computer science Operating systems (Computers) Systems and Data Security Computers and Society Management of Computing and Information Systems Operating Systems |
ISBN | 3-319-10329-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and Privacy in Smart Grid Demand Response Systems -- Distributed MILS Architectural Approach for Secure Smart Grids -- Determining the Probability of Smart Grid Attacks by Combining -- Attack Tree and Attack Graph Analysis -- Selective release of smart metering data in multi-domain smart grids -- Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid -- A Threat Analysis Methodology for Smart Home Scenarios -- A Privacy-friendly Framework for Vehicle-to-Grid Interactions -- Reactive Security for Smart Grids -- Privacy in Residential Demand Side Management Applications -- Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements -- CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot. |
Record Nr. | UNISA-996198263303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Grid Security : Second International Workshop, SmartGridSec 2014, Munich, Germany, February 26, 2014, Revised Selected Papers / / edited by Jorge Cuellar |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (X, 193 p. 50 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization Management information systems Computer science Operating systems (Computers) Systems and Data Security Computers and Society Management of Computing and Information Systems Operating Systems |
ISBN | 3-319-10329-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Security and Privacy in Smart Grid Demand Response Systems -- Distributed MILS Architectural Approach for Secure Smart Grids -- Determining the Probability of Smart Grid Attacks by Combining -- Attack Tree and Attack Graph Analysis -- Selective release of smart metering data in multi-domain smart grids -- Redactable Signatures to Control the Maximum Noise for Differential Privacy in the Smart Grid -- A Threat Analysis Methodology for Smart Home Scenarios -- A Privacy-friendly Framework for Vehicle-to-Grid Interactions -- Reactive Security for Smart Grids -- Privacy in Residential Demand Side Management Applications -- Enhancing Problem Frames with Trust and Reputation for Analyzing Smart Grid Security Requirements -- CryPLH: Protecting smart energy systems from targeted attacks with a PLC honeypot. |
Record Nr. | UNINA-9910483988403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Smart Grid Security [[electronic resource] ] : First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers / / edited by Jorge Cuellar |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (VIII, 151 p. 39 illus.) |
Disciplina | 005.43 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization Management information systems Computer science Operating systems (Computers) Systems and Data Security Computers and Society Management of Computing and Information Systems Operating Systems |
ISBN | 3-642-38030-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- IT Security Architecture Approaches for Smart Metering and Smart Grid -- Smart Grid Information Exchange – Securing the Smart Grid from the Ground -- A Tool Set for the Evaluation of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues in Smart Grids -- Hardware Security for Device Authentication in the Smart Grid -- Maintaining Privacy in Data Rich Demand Response Applications -- Data Protection in a Cloud-Enabled Smart Grid -- Formal Analysis of a Privacy-Preserving Billing Protocol -- Privacy in Smart Metering Ecosystems -- Energy@home Leveraging ZigBee to Enable Smart Grid in Residential Environment. |
Record Nr. | UNISA-996466176703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Smart Grid Security : First International Workshop, SmartGridSec 2012, Berlin, Germany, December 3, 2012, Revised Selected Papers / / edited by Jorge Cuellar |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (VIII, 151 p. 39 illus.) |
Disciplina | 005.43 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computers and civilization Management information systems Computer science Operating systems (Computers) Systems and Data Security Computers and Society Management of Computing and Information Systems Operating Systems |
ISBN | 3-642-38030-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Papers -- IT Security Architecture Approaches for Smart Metering and Smart Grid -- Smart Grid Information Exchange – Securing the Smart Grid from the Ground -- A Tool Set for the Evaluation of Security and Reliability in Smart Grids -- Regular Papers -- A Holistic View of Security and Privacy Issues in Smart Grids -- Hardware Security for Device Authentication in the Smart Grid -- Maintaining Privacy in Data Rich Demand Response Applications -- Data Protection in a Cloud-Enabled Smart Grid -- Formal Analysis of a Privacy-Preserving Billing Protocol -- Privacy in Smart Metering Ecosystems -- Energy@home Leveraging ZigBee to Enable Smart Grid in Residential Environment. |
Record Nr. | UNINA-9910484268603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|