You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability of systems: reliability, security and performance.
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. T...
This book constitutes the refereed proceedings of the 15th International Conference on Information Security, ISC 2015, held in Passau, Germany, in September 2012. The 23 revised full papers presented together with one invited paper were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on cryptography and cryptanalysis, mobility, cards and sensors, software security, processing encrypted data, authentication and identification, new directions in access control, GPU for security, and models for risk and revocation.
Wireless sensor networks (WSN) is especially vulnerable against external and internal attacks due to its particular characteristics. This book provides an overview of the major security issues that various WSN designers have to face, and also gives a comprehensive guide of solutions and open problems.
This book constitutes the refereed proceedings of the 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2006, held in Dallas, TX, USA in November 2006. The 36 revised full papers and 12 revised short papers presented together with the extended abstracts of 2 invited lectures address all aspects of self-stabilization, safety and security, recovery oriented systems and programming.
This book constitutes the refereed proceedings of the Second International Colloquium on Theoretical Aspects of Computing, ICTAC 2005 held in Hanoi, Vietnam, in October 2005. The 35 revised full papers presented together with 5 invited talks and a summary of 5 tutorials were carefully reviewed and selected from 122 submissions. The papers are organized in topical sections on formal languages, computer science logics, program construction, real-time systems, concurrency and refinement, software security, quantitative logics, object-orientation and component systems, model-checking and algorithms, and applied logics and computing theory.
This book constitutes the refereed post-proceedings of the 9th International Conference on Principles of Distributed Systems, OPODIS 2005, held in Pisa, Italy in December 2005. The volume presents 30 revised full papers and abstracts of 2 invited talks. The papers are organized in topical sections on nonblocking synchronization, fault-tolerant broadcast and consensus, self-stabilizing systems, peer-to-peer systems and collaborative environments, sensor networks and mobile computing, security and verification, real-time systems, and peer-to-peer systems.
This book constitutes the refereed proceedings of the 26th IFIP TC 11 International Information Security Conference, SEC 2011, held in Lucerne, Switzerland, in June 2011. The 24 revised full papers presented together with a keynote talk were carefully reviewed and selected from 100 submissions. The papers are organized in topical sections on malware, information flow and DoS attacks, authentication, network security and security protocols, software security, policy compliance and obligations, privacy attacks and privacy-enhancing technologies, risk analysis and security metrics, and intrusion detection.
This cumulative habilitation thesis, proposes concepts for (i) modelling and analysing dependability based on architectural models of software-intensive systems early in development, (ii) decomposition and composition of modelling languages and analysis techniques to enable more flexibility in evolution, and (iii) bridging the divergent levels of abstraction between data of the operation phase, architectural models and source code of the development phase.
This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2007, held in Paris, France, November 14-16, 2007. The 27 regular papers presented together with the extended abstracts of three invited lectures were carefully reviewed and selected from 64 submissions. The papers address all aspects of self-stabilization, safety and security, recovery oriented systems and programming.