top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Computer Safety, Reliability, and Security [[electronic resource] ] : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth
Computer Safety, Reliability, and Security [[electronic resource] ] : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 343 p.)
Disciplina 004n/a
Collana Programming and Software Engineering
Soggetto topico Computer security
Computer communication systems
Software engineering
Computers
Special purpose computers
Systems and Data Security
Computer Communication Networks
Software Engineering/Programming and Operating Systems
Information Systems and Communication Service
Software Engineering
Special Purpose and Application-Based Systems
Soggetto genere / forma Hamburg (2009)
Kongress.
ISBN 3-642-04468-9
Classificazione DAT 050f
DAT 260f
DAT 343f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- A Domain-Specific Framework for Automated Construction and Verification of Railway Control Systems -- Medical Systems -- Model-Based Development of Medical Devices -- Why Are People’s Decisions Sometimes Worse with Computer Support? -- Industrial Experience -- Safety-Related Application Conditions – A Balance between Safety Relevance and Handicaps for Applications -- Probability of Failure on Demand – The Why and the How -- Establishing the Correlation between Complexity and a Reliability Metric for Software Digital I&C-Systems -- Security Risk Analysis -- Exploring Network Security in PROFIsafe -- Modelling Critical Infrastructures in Presence of Lack of Data with Simulated Annealing – Like Algorithms -- Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security -- Safety Guidelines -- Experiences with the Certification of a Generic Functional Safety Management Structure According to IEC 61508 -- Analysing Dependability Case Arguments Using Quality Models -- Experience with Establishment of Reusable and Certifiable Safety Lifecycle Model within ABB -- Automotive -- Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats -- Safety Requirements for a Cooperative Traffic Management System: The Human Interface Perspective -- Aerospace -- The COMPASS Approach: Correctness, Modelling and Performability of Aerospace Systems -- Formal Verification of a Microkernel Used in Dependable Software Systems -- Issues in Tool Qualification for Safety-Critical Hardware: What Formal Approaches Can and Cannot Do -- Verification, Validation, Test -- Probabilistic Failure Propagation and Transformation Analysis -- Towards Model-Based Automatic Testing of Attack Scenarios -- CRIOP: A Human Factors Verification and Validation Methodology That Works in an Industrial Setting -- Fault Tolerance -- Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure -- Increasing the Reliability of High Redundancy Actuators by Using Elements in Series and Parallel -- AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware -- Dependability -- Component-Based Abstraction in Fault Tree Analysis -- A Foundation for Requirements Analysis of Dependable Software -- Establishing a Framework for Dynamic Risk Management in ‘Intelligent’ Aero-Engine Control.
Record Nr. UNISA-996465672203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Computer Safety, Reliability, and Security [[electronic resource] ] : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth
Computer Safety, Reliability, and Security [[electronic resource] ] : 28th International Conference, SAFECOMP 2009, Hamburg, Germany, September 15-18, 2009. Proceedings / / edited by Bettina Buth, Gerd Rabe, Till Seyfarth
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 343 p.)
Disciplina 004n/a
Collana Programming and Software Engineering
Soggetto topico Computer security
Computer communication systems
Software engineering
Computers
Special purpose computers
Systems and Data Security
Computer Communication Networks
Software Engineering/Programming and Operating Systems
Information Systems and Communication Service
Software Engineering
Special Purpose and Application-Based Systems
Soggetto genere / forma Hamburg (2009)
Kongress.
ISBN 3-642-04468-9
Classificazione DAT 050f
DAT 260f
DAT 343f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- A Domain-Specific Framework for Automated Construction and Verification of Railway Control Systems -- Medical Systems -- Model-Based Development of Medical Devices -- Why Are People’s Decisions Sometimes Worse with Computer Support? -- Industrial Experience -- Safety-Related Application Conditions – A Balance between Safety Relevance and Handicaps for Applications -- Probability of Failure on Demand – The Why and the How -- Establishing the Correlation between Complexity and a Reliability Metric for Software Digital I&C-Systems -- Security Risk Analysis -- Exploring Network Security in PROFIsafe -- Modelling Critical Infrastructures in Presence of Lack of Data with Simulated Annealing – Like Algorithms -- Environment Characterization and System Modeling Approach for the Quantitative Evaluation of Security -- Safety Guidelines -- Experiences with the Certification of a Generic Functional Safety Management Structure According to IEC 61508 -- Analysing Dependability Case Arguments Using Quality Models -- Experience with Establishment of Reusable and Certifiable Safety Lifecycle Model within ABB -- Automotive -- Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats -- Safety Requirements for a Cooperative Traffic Management System: The Human Interface Perspective -- Aerospace -- The COMPASS Approach: Correctness, Modelling and Performability of Aerospace Systems -- Formal Verification of a Microkernel Used in Dependable Software Systems -- Issues in Tool Qualification for Safety-Critical Hardware: What Formal Approaches Can and Cannot Do -- Verification, Validation, Test -- Probabilistic Failure Propagation and Transformation Analysis -- Towards Model-Based Automatic Testing of Attack Scenarios -- CRIOP: A Human Factors Verification and Validation Methodology That Works in an Industrial Setting -- Fault Tolerance -- Reliability Analysis for the Advanced Electric Power Grid: From Cyber Control and Communication to Physical Manifestations of Failure -- Increasing the Reliability of High Redundancy Actuators by Using Elements in Series and Parallel -- AN-Encoding Compiler: Building Safety-Critical Systems with Commodity Hardware -- Dependability -- Component-Based Abstraction in Fault Tree Analysis -- A Foundation for Requirements Analysis of Dependable Software -- Establishing a Framework for Dynamic Risk Management in ‘Intelligent’ Aero-Engine Control.
Record Nr. UNINA-9910484216803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Critical Information Infrastructure Security [[electronic resource] ] : Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 / / edited by Roberto Setola, Stefan Geretshuber
Critical Information Infrastructure Security [[electronic resource] ] : Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 / / edited by Roberto Setola, Stefan Geretshuber
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 396 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Quality control
Reliability
Industrial safety
Applied mathematics
Engineering mathematics
Management information systems
Computer science
Algorithms
Systems and Data Security
Computer Communication Networks
Quality Control, Reliability, Safety and Risk
Mathematical and Computational Engineering
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Soggetto genere / forma Kongress.
Rom(2008)
ISBN 3-642-03552-3
Classificazione DAT 460f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies -- Stability of a Distributed Generation Network Using the Kuramoto Models -- Enabling System of Systems Analysis of Critical Infrastructure Behaviors -- Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS -- Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures -- Interdependency Analysis in Electric Power Systems -- Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach -- Self-healing and Resilient Critical Infrastructures -- Critical Infrastructures Security Modeling, Enforcement and Runtime Checking -- INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project -- Increase of Power System Survivability with the Decision Support Tool CRIPS Based on Network Planning and Simulation Program PSS®SINCAL -- Information Modelling and Simulation in Large Dependent Critical Infrastructures – An Overview on the European Integrated Project IRRIIS -- Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks -- Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure -- RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support -- Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures -- Assessing and Improving SCADA Security in the Dutch Drinking Water Sector -- Analysis of Malicious Traffic in Modbus/TCP Communications -- Scada Malware, a Proof of Concept -- Testbeds for Assessing Critical Scenarios in Power Control Systems -- A Structured Approach to Incident Response Management in the Oil and Gas Industry -- Security Strategy Analysis for Critical Information Infrastructures -- Emerging Information Infrastructures: Cooperation in Disasters -- Service Modeling Language Applied to Critical Infrastructure -- Graded Security Expert System -- Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel -- Adaptation of Modelling Paradigms to the CIs Interdependencies Problem -- Empirical Findings on Critical Infrastructure Dependencies in Europe -- Dependent Automata for the Modelling of Dependencies -- Application of IPK (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making -- Disaster Propagation in Heterogeneous Media via Markovian Agents -- A Study on Multiformalism Modeling of Critical Infrastructures -- Simulation of Critical ICT Infrastructure for Municipal Crisis Management -- An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning -- Security of Water Infrastructure Systems -- Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture -- Challenges Concerning the Energy-Dependency of the Telecom Infrastructure -- An Effective Approach for Cascading Effects Prevision in Critical Infrastructures.
Record Nr. UNISA-996465627503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Critical Information Infrastructure Security : Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 / / edited by Roberto Setola, Stefan Geretshuber
Critical Information Infrastructure Security : Third International Workshop, CRITIS 2008, Rome, Italy, October 13-15, 2008 / / edited by Roberto Setola, Stefan Geretshuber
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIV, 396 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Computer communication systems
Quality control
Reliability
Industrial safety
Applied mathematics
Engineering mathematics
Management information systems
Computer science
Algorithms
Systems and Data Security
Computer Communication Networks
Quality Control, Reliability, Safety and Risk
Mathematical and Computational Engineering
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Soggetto genere / forma Kongress.
Rom(2008)
ISBN 3-642-03552-3
Classificazione DAT 460f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Blackouts in Power Transmission Networks Due to Spatially Localized Load Anomalies -- Stability of a Distributed Generation Network Using the Kuramoto Models -- Enabling System of Systems Analysis of Critical Infrastructure Behaviors -- Information Modelling and Simulation in Large Interdependent Critical Infrastructures in IRRIIS -- Multi-level Dependability Modeling of Interdependencies between the Electricity and Information Infrastructures -- Interdependency Analysis in Electric Power Systems -- Modeling and Simulation of Complex Interdependent Systems: A Federated Agent-Based Approach -- Self-healing and Resilient Critical Infrastructures -- Critical Infrastructures Security Modeling, Enforcement and Runtime Checking -- INcreasing Security and Protection through Infrastructure REsilience: The INSPIRE Project -- Increase of Power System Survivability with the Decision Support Tool CRIPS Based on Network Planning and Simulation Program PSS®SINCAL -- Information Modelling and Simulation in Large Dependent Critical Infrastructures – An Overview on the European Integrated Project IRRIIS -- Assessment of Structural Vulnerability for Power Grids by Network Performance Based on Complex Networks -- Using Centrality Measures to Rank the Importance of the Components of a Complex Network Infrastructure -- RadialNet: An Interactive Network Topology Visualization Tool with Visual Auditing Support -- Quantitative Security Risk Assessment and Management for Railway Transportation Infrastructures -- Assessing and Improving SCADA Security in the Dutch Drinking Water Sector -- Analysis of Malicious Traffic in Modbus/TCP Communications -- Scada Malware, a Proof of Concept -- Testbeds for Assessing Critical Scenarios in Power Control Systems -- A Structured Approach to Incident Response Management in the Oil and Gas Industry -- Security Strategy Analysis for Critical Information Infrastructures -- Emerging Information Infrastructures: Cooperation in Disasters -- Service Modeling Language Applied to Critical Infrastructure -- Graded Security Expert System -- Protection of Mobile Agents Execution Using a Modified Self-Validating Branch-Based Software Watermarking with External Sentinel -- Adaptation of Modelling Paradigms to the CIs Interdependencies Problem -- Empirical Findings on Critical Infrastructure Dependencies in Europe -- Dependent Automata for the Modelling of Dependencies -- Application of IPK (Information, Preferences, Knowledge) Paradigm for the Modelling of Precautionary Principle Based Decision-Making -- Disaster Propagation in Heterogeneous Media via Markovian Agents -- A Study on Multiformalism Modeling of Critical Infrastructures -- Simulation of Critical ICT Infrastructure for Municipal Crisis Management -- An Ontology-Based Approach to Blind Spot Revelation in Critical Infrastructure Protection Planning -- Security of Water Infrastructure Systems -- Critical Infrastructures as Complex Systems: A Multi-level Protection Architecture -- Challenges Concerning the Energy-Dependency of the Telecom Infrastructure -- An Effective Approach for Cascading Effects Prevision in Critical Infrastructures.
Record Nr. UNINA-9910485147903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings / / edited by Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings / / edited by Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 207 p. 55 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
E-commerce
Computer communication systems
Architecture, Computer
Management information systems
Computer science
Software engineering
Systems and Data Security
e-Commerce/e-business
Computer Communication Networks
Computer System Implementation
Management of Computing and Information Systems
Software Engineering
Soggetto genere / forma Kongress2013.Berlin
Conference proceedings.
ISBN 3-642-39235-0
Classificazione DAT 055f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware -- Network security -- Web security -- Attacks and defenses -- Host security.
Record Nr. UNISA-996466258403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings / / edited by Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 10th International Conference, DIMVA 2013, Berlin, Germany, July 18-19, 2013. Proceedings / / edited by Konrad Rieck, Patrick Stewin, Jean-Pierre Seifert
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 207 p. 55 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
E-commerce
Computer communication systems
Architecture, Computer
Management information systems
Computer science
Software engineering
Systems and Data Security
e-Commerce/e-business
Computer Communication Networks
Computer System Implementation
Management of Computing and Information Systems
Software Engineering
Soggetto genere / forma Kongress2013.Berlin
Conference proceedings.
ISBN 3-642-39235-0
Classificazione DAT 055f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware -- Network security -- Web security -- Attacks and defenses -- Host security.
Record Nr. UNINA-9910483726603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi
Detection of Intrusions and Malware, and Vulnerability Assessment [[electronic resource] ] : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 225 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Computer security
Computers and civilization
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Systems and Data Security
Computers and Society
Soggetto genere / forma Como (2009)
Kongress.
ISBN 3-642-02918-3
Classificazione DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection.
Record Nr. UNISA-996465430203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi
Detection of Intrusions and Malware, and Vulnerability Assessment : 6th International Conference, DIMVA 2009, Milan, Italy, July 9-10, 2009. Proceedings / / edited by Ulrich Flegel, Danilo Bruschi
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 225 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Management information systems
Computer science
Computer communication systems
Computer security
Computers and civilization
Cryptology
Management of Computing and Information Systems
Computer Communication Networks
Systems and Data Security
Computers and Society
Soggetto genere / forma Como (2009)
Kongress.
ISBN 3-642-02918-3
Classificazione DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Malware and SPAM -- A Case Study on Asprox Infection Dynamics -- How Good Are Malware Detectors at Remediating Infected Systems? -- Towards Proactive Spam Filtering (Extended Abstract) -- Emulation-Based Detection -- Shepherding Loadable Kernel Modules through On-demand Emulation -- Yataglass: Network-Level Code Emulation for Analyzing Memory-Scanning Attacks -- Defending Browsers against Drive-by Downloads: Mitigating Heap-Spraying Code Injection Attacks -- Software Diversity -- Polymorphing Software by Randomizing Data Structure Layout -- On the Effectiveness of Software Diversity: A Systematic Study on Real-World Vulnerabilities -- Harnessing Context -- Using Contextual Information for IDS Alarm Classification (Extended Abstract) -- Browser Fingerprinting from Coarse Traffic Summaries: Techniques and Implications -- A Service Dependency Modeling Framework for Policy-Based Response Enforcement -- Anomaly Detection -- Learning SQL for Database Intrusion Detection Using Context-Sensitive Modelling (Extended Abstract) -- Selecting and Improving System Call Models for Anomaly Detection.
Record Nr. UNINA-9910484356103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Formal to Practical Security [[electronic resource] ] : Papers Issued from the 2005-2008 French-Japanese Collaboration / / edited by Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada
Formal to Practical Security [[electronic resource] ] : Papers Issued from the 2005-2008 French-Japanese Collaboration / / edited by Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VII, 199 p.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer programming
Pattern recognition
Computers and civilization
Data structures (Computer science)
Biometrics (Biology)
Cryptology
Programming Techniques
Pattern Recognition
Computers and Society
Data Structures and Information Theory
Biometrics
Soggetto genere / forma Aufsatzsammlung
ISBN 3-642-02002-X
Classificazione DAT 460f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Formal to Practical Security -- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables -- Validating Integrity for the Ephemerizer’s Protocol with CL-Atse -- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols -- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin -- Comparing State Spaces in Automatic Security Protocol Analysis -- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures -- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment -- New Anonymity Notions for Identity-Based Encryption -- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption -- Writing an OS Kernel in a Strictly and Statically Typed Language.
Record Nr. UNISA-996466267503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Formal to Practical Security : Papers Issued from the 2005-2008 French-Japanese Collaboration / / edited by Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada
Formal to Practical Security : Papers Issued from the 2005-2008 French-Japanese Collaboration / / edited by Véronique Cortier, Claude Kirchner, Mitsuhiro Okada, Hideki Sakurada
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VII, 199 p.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer programming
Pattern recognition
Computers and civilization
Data structures (Computer science)
Biometrics (Biology)
Cryptology
Programming Techniques
Pattern Recognition
Computers and Society
Data Structures and Information Theory
Biometrics
Soggetto genere / forma Aufsatzsammlung
ISBN 3-642-02002-X
Classificazione DAT 460f
DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Formal to Practical Security -- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables -- Validating Integrity for the Ephemerizer’s Protocol with CL-Atse -- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols -- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin -- Comparing State Spaces in Automatic Security Protocol Analysis -- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures -- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment -- New Anonymity Notions for Identity-Based Encryption -- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption -- Writing an OS Kernel in a Strictly and Statically Typed Language.
Record Nr. UNINA-9910484890203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui