top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Abstract State Machines, Alloy, B, VDM, and Z [[electronic resource] ] : Third International Conference, ABZ 2012, Pisa, Italy, June 18-21, 2012. Proceedings / / edited by John Derrick, John Fitzgerald, Stefania Gnesi, Sarfraz Khurshid, Michael Leuschel, Steve Reeves, Elvinia Riccobene
Abstract State Machines, Alloy, B, VDM, and Z [[electronic resource] ] : Third International Conference, ABZ 2012, Pisa, Italy, June 18-21, 2012. Proceedings / / edited by John Derrick, John Fitzgerald, Stefania Gnesi, Sarfraz Khurshid, Michael Leuschel, Steve Reeves, Elvinia Riccobene
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XV, 378 p. 133 illus.)
Disciplina 006.3/1
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Algorithms
Computer science—Mathematics
Discrete mathematics
Computer Science Logic and Foundations of Programming
Theory of Computation
Mathematics of Computing
Discrete Mathematics in Computer Science
ISBN 3-642-30885-6
Classificazione 54.53
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contribution to a Rigorous Analysis of Web Application Frameworks / Egon Börger, Antonio Cisternino and Vincenzo Gervasi -- Integrated Operational Semantics: Small-Step, Big-Step and Multi-step / Ian J. Hayes and Robert J. Colvin -- Test Generation for Sequential Nets of Abstract State Machines / Paolo Arcaini, Francesco Bolis and Angelo Gargantini -- ASM and Controller Synthesis / Richard Banach, Huibiao Zhu, Wen Su and Xiaofeng Wu -- Continuous ASM, and a Pacemaker Sensing Fragment / Richard Banach, Huibiao Zhu, Wen Su and Xiaofeng Wu -- An ASM Model of Concurrency in a Web Browser / Vincenzo Gervasi -- Modeling the Supervisory Control Theory with Alloy / Benoît Fraikin, Marc Frappier and Richard St-Denis -- Preventing Arithmetic Overflows in Alloy / Aleksandar Milicevic and Daniel Jackson -- Extending Alloy with Partial Instances / Vajih Montaghami and Derek Rayside -- Toward a More Complete Alloy / Timothy Nelson, Daniel J. Dougherty, Kathi Fisler and Shriram Krishnamurthi -- Temporal Logic Model Checking in Alloy / Amirhossein Vakili and Nancy A. Day -- Active Attacking Multicast Key Management Protocol Using Alloy / Ting Wang and Dongyao Ji -- Formalizing Hybrid Systems with Event-B / Jean-Raymond Abrial, Wen Su and Huibiao Zhu -- SMT Solvers for Rodin / David Déharbe, Pascal Fontaine, Yoann Guyot and Laurent Voisin -- Refinement Plans for Informed Formal Design / Gudmund Grov, Andrew Ireland and Maria Teresa Llano -- Refinement by Interface Instantiation / Stefan Hallerstede and Thai Son Hoang -- Discharging Proof Obligations from Atelier B Using Multiple Automated Provers / David Mentré, Claude Marché, Jean-Christophe Filliâtre and Masashi Asuka -- A Semantic Analysis of Logics That Cope with Partial Terms / Cliff B. Jones, Matthew J. Lovert and L. Jason Steggles -- Combining VDM with Executable Code / Claus Ballegaard Nielsen, Kenneth Lausdahl and Peter Gorm Larsen -- Extending the Test Template Framework to Deal with Axiomatic Descriptions, Quantifiers and Set Comprehensions / Maximiliano Cristiá and Claudia Frydman -- A Tool Chain for the Automatic Generation of Circus Specifications of Simulink Diagrams / Chris Marriott, Frank Zeyda and Ana Cavalcanti -- Verification of Hardware Interaction Properties of Software / Ramsay Taylor -- Using the Arbitrator Pattern for Dynamic Process-Instance Extension in a Work-Flow Management System / Matthes Elstermann, Detlef Seese and Albert Fleischmann -- A Unified Processor Model for Compiler Verification and Simulation Using ASM / Roland Lezuo and Andreas Krall -- Modeling Synchronization/Communication Patterns in Vision-Based Robot Control Applications Using ASMs / Andrea Luzzana, Mattia Rossetti, Paolo Righettini and Patrizia Scandurra -- A Reliability Prediction Method for Abstract State Machines / Raffaela Mirandola, Pasqualina Potena and Patrizia Scandurra -- A Simplified Parallel ASM Thesis / Klaus-Dieter Schewe and Qing Wang -- Refactoring Abstract State Machine Models / Hamed Yaghoubi Shahir, Roozbeh Farahbod and Uwe Glässer -- Continuous Behaviour in Event-B: A Sketch / Richard Banach, Huibiao Zhu, Wen Su and Xiaofeng Wu -- Formal Verification of PLC Programs Using the B Method / Haniel Barbosa and David Déharbe -- A Practical Event-B Refinement Method Based on a UML-Driven Development Process / Thiago C. de Sousa, Paulo Sérgio Muniz Silva and Colin F. Snook -- Learn and Test for Event-B -- A Rodin Plugin / Ionut Dinca, Florentin Ipate, Laurentiu Mierla and Alin Stefanescu -- Event-B Code Generation: Type Extension with Theories / Andrew Edmunds, Michael Butler, Issam Maamria, Renato Silva and Chris Lovell -- Formal Proofs for the NYCT Line 7 (Flushing) Modernization Project / Denis Sabatier, Lilian Burdy, Antoine Requet and Jérôme Guéry -- A Pattern for Modelling Fault Tolerant Systems in Event-B / Gintautas Sulskus and Michael Poppleton.
Record Nr. UNISA-996465312903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Abstract State Machines, B and Z [[electronic resource] ] : First International Conference, ABZ 2008, London, UK, September 16-18, 2008. Proceedings / / edited by Egon Börger, Michael Butler, Jonathan P. Bowen, Paul Boca
Abstract State Machines, B and Z [[electronic resource] ] : First International Conference, ABZ 2008, London, UK, September 16-18, 2008. Proceedings / / edited by Egon Börger, Michael Butler, Jonathan P. Bowen, Paul Boca
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XII, 384 p.)
Disciplina 005.12
Collana Theoretical Computer Science and General Issues
Soggetto topico Software engineering
Computer science
Machine theory
Compilers (Computer programs)
Database management
Software Engineering
Computer Science Logic and Foundations of Programming
Formal Languages and Automata Theory
Compilers and Interpreters
Database Management
ISBN 3-540-87603-0
Classificazione 54.10
DAT 550f
SS 4800
004
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without Sacrificing Productivity -- The High Road to Formal Validation: -- Modeling Workflows, Interaction Patterns, Web Services and Business Processes: The ASM-Based Approach -- Refinement of State-Based Systems: ASMs and Big Commuting Diagrams (Abstract) -- 2. ASM Papers -- Model Based Refinement and the Tools of Tomorrow -- A Concept-Driven Construction of the Mondex Protocol Using Three Refinements -- A Scenario-Based Validation Language for ASMs -- Data Flow Analysis and Testing of Abstract State Machines -- A Verified AsmL Implementation of Belief Revision -- Direct Support for Model Checking Abstract State Machines by Utilizing Simulation -- 3. B Papers -- On the Purpose of Event-B Proof Obligations -- Generating Tests from B Specifications and Test Purposes -- Combining Scenario- and Model-Based Testing to Ensure POSIX Compliance -- UseCase-Wise Development: Retrenchment for Event-B -- Towards Modelling Obligations in Event-B -- A Practical Single Refinement Method for B -- The Composition of Event-B Models -- Reconciling Axiomatic and Model-Based Specifications Reprised -- A Verifiable Conformance Relationship between Smart Card Applets and B Security Models -- Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols -- Using EventB to Create a Virtual Machine Instruction Set Architecture -- 4. Z Papers -- Z2SAL - Building a Model Checker for Z -- Formal Modeling and Analysis of a Flash Filesystem in Alloy -- Unit Testing of Z Specifications -- Autonomous Objects and Bottom-Up Composition in ZOO Applied to a Case Study of Biological Reactivity -- 5. ABZ Short Papers -- Integrating Z into Large Projects Tools and Techniques -- A First Attempt to Express KAOS Refinement Patterns with Event B -- Verification and Validation of Web Service Composition Using Event B Method -- Stability of Real-Time Abstract State Machines under Desynchronization -- XML Database Transformations with Tree Updates -- Dynamic Resource Configuration & Management for Distributed Information Fusion in Maritime Surveillance -- UML-B: A Plug-in for the Event-B Tool Set -- BART: A Tool for Automatic Refinement -- Model Checking Event-B by Encoding into Alloy -- A Roadmap for the Rodin Toolset -- Exploiting the ASM Method for Validation & Verification of Embedded Systems -- Tool Support for the Circus Refinement Calculus -- Separation of Z Operations -- BSmart: A Tool for the Development of Java Card Applications with the B Method -- From ABZ to Cryptography -- Using ASM to Achieve Executability within a Family of DSL -- Using Satisfiability Modulo Theories to Analyze Abstract State Machines (Abstract) -- Formal Verification of ASM Models Using TLA?+? -- DIR 41 Case Study -- FDIR Architectures for Autonomous Spacecraft: Specification and Assessment with Event-B -- Object Modelling in the SystemB Industrial Project -- 6. VSR Day -- Splitting Atoms with Rely/Guarantee Conditions Coupled with Data Reification -- ABZ2008 VSR-Net Workshop.
Record Nr. UNISA-996465278603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Abstract State Machines, B and Z [[electronic resource] ] : First International Conference, ABZ 2008, London, UK, September 16-18, 2008. Proceedings / / edited by Egon Börger, Michael Butler, Jonathan P. Bowen, Paul Boca
Abstract State Machines, B and Z [[electronic resource] ] : First International Conference, ABZ 2008, London, UK, September 16-18, 2008. Proceedings / / edited by Egon Börger, Michael Butler, Jonathan P. Bowen, Paul Boca
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Descrizione fisica 1 online resource (XII, 384 p.)
Disciplina 005.12
Collana Theoretical Computer Science and General Issues
Soggetto topico Software engineering
Computer science
Machine theory
Compilers (Computer programs)
Database management
Software Engineering
Computer Science Logic and Foundations of Programming
Formal Languages and Automata Theory
Compilers and Interpreters
Database Management
ISBN 3-540-87603-0
Classificazione 54.10
DAT 550f
SS 4800
004
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1. ABZ Invited Talks -- Complex Hardware Modules Can Now be Made Free of Functional Errors without Sacrificing Productivity -- The High Road to Formal Validation: -- Modeling Workflows, Interaction Patterns, Web Services and Business Processes: The ASM-Based Approach -- Refinement of State-Based Systems: ASMs and Big Commuting Diagrams (Abstract) -- 2. ASM Papers -- Model Based Refinement and the Tools of Tomorrow -- A Concept-Driven Construction of the Mondex Protocol Using Three Refinements -- A Scenario-Based Validation Language for ASMs -- Data Flow Analysis and Testing of Abstract State Machines -- A Verified AsmL Implementation of Belief Revision -- Direct Support for Model Checking Abstract State Machines by Utilizing Simulation -- 3. B Papers -- On the Purpose of Event-B Proof Obligations -- Generating Tests from B Specifications and Test Purposes -- Combining Scenario- and Model-Based Testing to Ensure POSIX Compliance -- UseCase-Wise Development: Retrenchment for Event-B -- Towards Modelling Obligations in Event-B -- A Practical Single Refinement Method for B -- The Composition of Event-B Models -- Reconciling Axiomatic and Model-Based Specifications Reprised -- A Verifiable Conformance Relationship between Smart Card Applets and B Security Models -- Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols -- Using EventB to Create a Virtual Machine Instruction Set Architecture -- 4. Z Papers -- Z2SAL - Building a Model Checker for Z -- Formal Modeling and Analysis of a Flash Filesystem in Alloy -- Unit Testing of Z Specifications -- Autonomous Objects and Bottom-Up Composition in ZOO Applied to a Case Study of Biological Reactivity -- 5. ABZ Short Papers -- Integrating Z into Large Projects Tools and Techniques -- A First Attempt to Express KAOS Refinement Patterns with Event B -- Verification and Validation of Web Service Composition Using Event B Method -- Stability of Real-Time Abstract State Machines under Desynchronization -- XML Database Transformations with Tree Updates -- Dynamic Resource Configuration & Management for Distributed Information Fusion in Maritime Surveillance -- UML-B: A Plug-in for the Event-B Tool Set -- BART: A Tool for Automatic Refinement -- Model Checking Event-B by Encoding into Alloy -- A Roadmap for the Rodin Toolset -- Exploiting the ASM Method for Validation & Verification of Embedded Systems -- Tool Support for the Circus Refinement Calculus -- Separation of Z Operations -- BSmart: A Tool for the Development of Java Card Applications with the B Method -- From ABZ to Cryptography -- Using ASM to Achieve Executability within a Family of DSL -- Using Satisfiability Modulo Theories to Analyze Abstract State Machines (Abstract) -- Formal Verification of ASM Models Using TLA?+? -- DIR 41 Case Study -- FDIR Architectures for Autonomous Spacecraft: Specification and Assessment with Event-B -- Object Modelling in the SystemB Industrial Project -- 6. VSR Day -- Splitting Atoms with Rely/Guarantee Conditions Coupled with Data Reification -- ABZ2008 VSR-Net Workshop.
Record Nr. UNINA-9910483369103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues [[electronic resource] ] : 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers / / edited by Mitsu Okada, Ichiro Satoh
Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues [[electronic resource] ] : 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers / / edited by Mitsu Okada, Ichiro Satoh
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XV, 364 p.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Data structures (Computer science)
Information theory
Data protection
Algorithms
Computer networks
Theory of Computation
Computer Science Logic and Foundations of Programming
Data Structures and Information Theory
Data and Information Security
Computer Communication Networks
ISBN 3-540-77505-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ASIAN’2006 -- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers -- A Symbolic Intruder Model for Hash-Collision Attacks -- A Denotational Approach to Scope-Based Compensable Flow Language for Web Service -- Certificateless Authenticated Two-Party Key Agreement Protocols -- FORM : A Federated Rights Expression Model for Open DRM Frameworks -- A Method of Safety Analysis for Runtime Code Update -- Automata-Based Confidentiality Monitoring -- Efficient and Practical Control Flow Monitoring for Program Security -- Modular Formalization of Reactive Modules in COQ -- Closing Internal Timing Channels by Transformation -- Responsiveness in Process Calculi -- Normal Proofs in Intruder Theories -- Breaking and Fixing Public-Key Kerberos -- Computational Soundness of Formal Indistinguishability and Static Equivalence -- Secrecy Analysis in Protocol Composition Logic -- A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations -- On Completeness of Logical Relations for Monadic Types -- A Spatial Logical Characterisation of Context Bisimulation -- Information Hiding in the Join Calculus -- Modeling Urgency in Component-Based Real-Time Systems -- Maintaining Data Consistency of XML Databases Using Verification Techniques -- An Operational Semantics of Program Dependence Graphs for Unstructured Programs -- Combination of Abstractions in the ASTRÉE Static Analyzer -- Proving Noninterference by a Fully Complete Translation to the Simply Typed ?-Calculus -- Formalization of CTL* in Calculus of Inductive Constructions -- Inferring Disjunctive Postconditions -- An Approach to Formal Verification of Arithmetic Functions in Assembly.
Record Nr. UNISA-996465770703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues [[electronic resource] ] : 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers / / edited by Mitsu Okada, Ichiro Satoh
Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues [[electronic resource] ] : 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers / / edited by Mitsu Okada, Ichiro Satoh
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XV, 364 p.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Data structures (Computer science)
Information theory
Data protection
Algorithms
Computer networks
Theory of Computation
Computer Science Logic and Foundations of Programming
Data Structures and Information Theory
Data and Information Security
Computer Communication Networks
ISBN 3-540-77505-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto ASIAN’2006 -- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers -- A Symbolic Intruder Model for Hash-Collision Attacks -- A Denotational Approach to Scope-Based Compensable Flow Language for Web Service -- Certificateless Authenticated Two-Party Key Agreement Protocols -- FORM : A Federated Rights Expression Model for Open DRM Frameworks -- A Method of Safety Analysis for Runtime Code Update -- Automata-Based Confidentiality Monitoring -- Efficient and Practical Control Flow Monitoring for Program Security -- Modular Formalization of Reactive Modules in COQ -- Closing Internal Timing Channels by Transformation -- Responsiveness in Process Calculi -- Normal Proofs in Intruder Theories -- Breaking and Fixing Public-Key Kerberos -- Computational Soundness of Formal Indistinguishability and Static Equivalence -- Secrecy Analysis in Protocol Composition Logic -- A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations -- On Completeness of Logical Relations for Monadic Types -- A Spatial Logical Characterisation of Context Bisimulation -- Information Hiding in the Join Calculus -- Modeling Urgency in Component-Based Real-Time Systems -- Maintaining Data Consistency of XML Databases Using Verification Techniques -- An Operational Semantics of Program Dependence Graphs for Unstructured Programs -- Combination of Abstractions in the ASTRÉE Static Analyzer -- Proving Noninterference by a Fully Complete Translation to the Simply Typed ?-Calculus -- Formalization of CTL* in Calculus of Inductive Constructions -- Inferring Disjunctive Postconditions -- An Approach to Formal Verification of Arithmetic Functions in Assembly.
Record Nr. UNINA-9910768475703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computer Science - ASIAN 2007. Computer and Network Security [[electronic resource] ] : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings / / edited by Iliano Cervesato
Advances in Computer Science - ASIAN 2007. Computer and Network Security [[electronic resource] ] : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings / / edited by Iliano Cervesato
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XI, 316 p.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Data structures (Computer science)
Information theory
Data protection
Algorithms
Computer networks
Theory of Computation
Computer Science Logic and Foundations of Programming
Data Structures and Information Theory
Data and Information Security
Computer Communication Networks
ISBN 3-540-76929-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Speaker: Andrei Sabelfeld -- Dimensions of Declassification in Theory and Practice -- A Static Birthmark of Binary Executables Based on API Call Structure -- Compiling C Programs into a Strongly Typed Assembly Language -- Information Flow Testing -- Large Scale Simulation of Tor: -- Privacy Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols -- Scalable DRM System for Media Portability -- Computational Semantics for Basic Protocol Logic – A Stochastic Approach -- Management Advantages of Object Classification in Role-Based Access Control (RBAC) -- An Integrated Model for Access Control and Information Flow Requirements -- Digital Rights Management Using a Master Control Device -- Invited Speaker: Joshua Guttman -- How to do Things with Cryptographic Protocols -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming -- Secure Verification of Location Claims with Simultaneous Distance Modification -- Invited Speaker: Kazuhiko Kato -- Modeling and Virtualization for Secure Computing Environments -- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces -- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver Address in IPv6 for Protecting Unlinkability -- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts -- Combining Heterogeneous Classifiers for Network Intrusion Detection -- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments -- On Run-Time Enforcement of Policies -- Static vs Dynamic Typing for Access Control in Pi-Calculus -- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.
Record Nr. UNISA-996465489803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Computer Science - ASIAN 2007. Computer and Network Security [[electronic resource] ] : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings / / edited by Iliano Cervesato
Advances in Computer Science - ASIAN 2007. Computer and Network Security [[electronic resource] ] : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007, Proceedings / / edited by Iliano Cervesato
Edizione [1st ed. 2007.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Descrizione fisica 1 online resource (XI, 316 p.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer science
Data structures (Computer science)
Information theory
Data protection
Algorithms
Computer networks
Theory of Computation
Computer Science Logic and Foundations of Programming
Data Structures and Information Theory
Data and Information Security
Computer Communication Networks
ISBN 3-540-76929-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Speaker: Andrei Sabelfeld -- Dimensions of Declassification in Theory and Practice -- A Static Birthmark of Binary Executables Based on API Call Structure -- Compiling C Programs into a Strongly Typed Assembly Language -- Information Flow Testing -- Large Scale Simulation of Tor: -- Privacy Enhancing Credentials -- Browser Based Agile E-Voting System -- Risk Balance in Exchange Protocols -- Scalable DRM System for Media Portability -- Computational Semantics for Basic Protocol Logic – A Stochastic Approach -- Management Advantages of Object Classification in Role-Based Access Control (RBAC) -- An Integrated Model for Access Control and Information Flow Requirements -- Digital Rights Management Using a Master Control Device -- Invited Speaker: Joshua Guttman -- How to do Things with Cryptographic Protocols -- A Formal Analysis for Capturing Replay Attacks in Cryptographic Protocols -- An Abstraction and Refinement Framework for Verifying Security Protocols Based on Logic Programming -- Secure Verification of Location Claims with Simultaneous Distance Modification -- Invited Speaker: Kazuhiko Kato -- Modeling and Virtualization for Secure Computing Environments -- Empirical Study of the Impact of Metasploit-Related Attacks in 4 Years of Attack Traces -- A Logical Framework for Evaluating Network Resilience Against Faults and Attacks -- Masquerade Detection Based Upon GUI User Profiling in Linux Systems -- One-Time Receiver Address in IPv6 for Protecting Unlinkability -- A Comprehensive Approach to Detect Unknown Attacks Via Intrusion Detection Alerts -- Combining Heterogeneous Classifiers for Network Intrusion Detection -- Managing Uncertainty in Access Control Decisions in Distributed Autonomous Collaborative Environments -- On Run-Time Enforcement of Policies -- Static vs Dynamic Typing for Access Control in Pi-Calculus -- A Sandbox with a Dynamic Policy Based on Execution Contexts of Applications.
Record Nr. UNINA-9910483496703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2007
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Computer Science, Information Security and Privacy [[electronic resource] ] : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings / / edited by Anupam Datta
Advances in Computer Science, Information Security and Privacy [[electronic resource] ] : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings / / edited by Anupam Datta
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (IX, 159 p.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Data protection
Computer programming
Computer science
Algorithms
Machine theory
Computer Communication Networks
Data and Information Security
Programming Techniques
Computer Science Logic and Foundations of Programming
Formal Languages and Automata Theory
ISBN 1-280-38329-1
9786613561213
3-642-10622-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto “Logic Wins!” -- Higher-Order Program Verification and Language-Based Security -- Deducibility Constraints -- Automated Security Proof for Symmetric Encryption Modes -- Noninterference with Dynamic Security Domains and Policies -- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers -- A Logic for Formal Verification of Quantum Programs -- Reducing Equational Theories for the Decision of Static Equivalence -- A Simulation-Based Treatment of Authenticated Message Exchange -- Trusted Deployment of Virtual Execution Environment in Grid Systems -- A Dolev-Yao Model for Zero Knowledge -- A Special Proxy Signature Scheme with Multi-warrant.
Record Nr. UNISA-996465324303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Computer Science, Information Security and Privacy [[electronic resource] ] : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings / / edited by Anupam Datta
Advances in Computer Science, Information Security and Privacy [[electronic resource] ] : 13th Asian Computing Science Conference, Seoul, Korea, December 14-16, 2009, Proceedings / / edited by Anupam Datta
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (IX, 159 p.)
Disciplina 005.8
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer networks
Data protection
Computer programming
Computer science
Algorithms
Machine theory
Computer Communication Networks
Data and Information Security
Programming Techniques
Computer Science Logic and Foundations of Programming
Formal Languages and Automata Theory
ISBN 1-280-38329-1
9786613561213
3-642-10622-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto “Logic Wins!” -- Higher-Order Program Verification and Language-Based Security -- Deducibility Constraints -- Automated Security Proof for Symmetric Encryption Modes -- Noninterference with Dynamic Security Domains and Policies -- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers -- A Logic for Formal Verification of Quantum Programs -- Reducing Equational Theories for the Decision of Static Equivalence -- A Simulation-Based Treatment of Authenticated Message Exchange -- Trusted Deployment of Virtual Execution Environment in Grid Systems -- A Dolev-Yao Model for Zero Knowledge -- A Special Proxy Signature Scheme with Multi-warrant.
Record Nr. UNINA-9910484255203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation [[electronic resource] ] : Essays Dedicated to Gerhard Brewka on the Occasion of His 60th Birthday / / edited by Thomas Eiter, Hannes Strass, Mirosław Truszczyński, Stefan Woltran
Advances in Knowledge Representation, Logic Programming, and Abstract Argumentation [[electronic resource] ] : Essays Dedicated to Gerhard Brewka on the Occasion of His 60th Birthday / / edited by Thomas Eiter, Hannes Strass, Mirosław Truszczyński, Stefan Woltran
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIV, 361 p. 58 illus.) : online resource
Disciplina 001.642
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
Machine theory
Computer science
Algorithms
Computer programming
Artificial Intelligence
Formal Languages and Automata Theory
Theory of Computation
Computer Science Logic and Foundations of Programming
Programming Techniques
ISBN 3-319-14726-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Prologue -- Actions and Agents -- Nonmonotonic and Human Reasoning.- Preferences -- Abstract Argumentation -- Reflections on Knowledge Representation.- Epilogue.
Record Nr. UNINA-9910484028203321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui