You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
Offers an extensive review of concurrent languages and calculi, with comprehensive figures and summaries. Presents and analyses many implementation strategies that can readily be used by developers of distributed systems.
Foundations of Information Technology in the Era of Network and Mobile Computing is presented in two distinct but interrelated tracks: -Algorithms, Complexity and Models of Computation; -Logic, Semantics, Specification and Verification. This volume contains 45 original and significant contributions addressing these foundational questions, as well as 4 papers by outstanding invited speakers. These papers were presented at the 2nd IFIP International Conference on Theoretical Computer Science (TCS 2002), which was held in conjunction with the 17th World Computer Congress, sponsored by the International Federation for Information Processing (IFIP), and which convened in Montréal, Québec, Canada in August 2002.
Event Structure were introduced in 1979 [18] as a formal model to connect the theory of Petri nets and domain theory. Originally they consisted of atomic non-repeatable events, a binary causal dependency relation, and a binary conflict relation between those events. For a long time various extensions of the original formalism were used to define semantics for other structures such as classes of Petri nets and process calculi.In this thesis the Event Structures (ESs) are considered solely as a declarative modelling tool than as a formalism to define semantics for other structures. In order to model highly dynamic real-world processes (i.e. processes in which occurrences of events may change t...
This book constitutes the thoroughly refereed post-workshop proceedings of the 6th International Workshop on Formal Aspects in Security and Trust, FAST 2009, held under the auspices of IFIP WG 1.7 in Eindhoven, The Netherlands, in November 2009 as an event of the Formal Methods Week, FMweek 2009. The 18 revised papers presented together with an abstract of the invited lecture were carefully reviewed and selected from 50 submissions. The papers focus of formal aspects in security and trust policy models, security protocol design and analysis, formal models of trust and reputation, logics for security and trust, distributed trust management systems, trust-based reasoning, digital assets protection, data protection, privacy and id issues, information flow analysis, language-based security, security and trust aspects in ubiquitous computing, validation/analysis tools, Web service security/trust/privacy, grid security, security risk assessment, and case studies.
This book constitutes the thoroughly refereed post-proceedings of the International Symposium on Trustworthy Global Computing, TGC 2005, held in Edinburgh, UK, in April 2005, and colocated with the events of ETAPS 2005. The 11 revised full papers presented together with 8 papers contributed by the invited speakers were carefully selected during 2 rounds of reviewing and improvement from numerous submissions. Topical issues covered by the workshop are resource usage, language-based security, theories of trust and authentication, privacy, reliability and business integrity access control and mechanisms for enforcing them, models of interaction and dynamic components management, language concepts and abstraction mechanisms, test generators, symbolic interpreters, type checkers, finite state model checkers, theorem provers, software principles to support debugging and verification.
Daily life relies more and more on safety critical systems, e.g. in areas such as power plant control, traffic management, flight control, and many more. MOVEP is a school devoted to the broad subject of modeling and verifying software and hardware systems. This volume contains tutorials and annotated bibliographies covering the main subjects addressed at MOVEP 2000. The four tutorials deal with Model Checking, Theorem Proving, Composition and Abstraction Techniques, and Timed Systems. Three research papers give detailed views of High-Level Message Sequence Charts, Industrial Applications of Model Checking, and the use of Formal Methods in Security. Finally, four annotated bibliographies give an overview of Infinite State Space Systems, Testing Transition Systems, Fault-Model-Driven Test Derivation, and Mobile Processes.
Modern civilization relies on a functioning information infrastructure. As a result, dependability has become a central issue in all disciplines of systems engineering and software architecture.Theories, methods and tools that help to master the problems encountered in the design process and the management of operations are therefore of utmost importance for the future of information and communication technology. The present volume documents the results of a research program on Dependable Information and Communication Systems (DICS). The members of the project met in two workshops organized by the Hasler Foundation. This state-of-the-art survey contains 3 overview articles identifying major issues of dependability and presenting the latest solutions, as well as 10 carefully selected and revised papers depicting the research results originating from those workshops. The first workshop took place in Münchenwiler, Switzerland, in March 2004, and the second workshop, which marked the conclusion of the projects, in Löwenberg, Switzerland, in October 2005. The papers are organized in topical sections on surveys, dependable software, dependable computing, and dependable networks.
This book constitutes the refereed proceedings of the 24th Annual Symposium on Theoretical Aspects of Computer Science, STACS 2007, held in Aachen, Germany in February 2007. The 56 revised full papers presented together with 3 invited papers were carefully reviewed and selected from about 400 submissions. The papers address the whole range of theoretical computer science including algorithms and data structures, automata and formal languages, complexity theory, logic in computer science, semantics, specification, and verification of programs, rewriting and deduction, as well as current challenges like biological computing, quantum computing, and mobile and net computing.
This book constitutes the refereed proceedings of the 20th International Conference on Software Engineering and Formal Methods, SEFM 2022, which took place in Berlin, Germany, in September 2022. The 19 full and 3 short papers included in this book were carefully reviewed and selected from 62 submissions. They were organized in topical sections as follows: software verification; program analysis; verifier technology; formal methods for intelligent and learning systems; specification and contracts; program synthesis; temporal logic; and runtime methods.