0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (12)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 13 of 13 matches in All Departments

A Process Algebraic Approach to Software Architecture Design (Hardcover, 2010 ed.): Alessandro Aldini, Marco Bernardo, Flavio... A Process Algebraic Approach to Software Architecture Design (Hardcover, 2010 ed.)
Alessandro Aldini, Marco Bernardo, Flavio Corradini
R1,970 R1,643 Discovery Miles 16 430 Save R327 (17%) Ships in 12 - 17 working days

Inthe?eldofformalmethodsincomputerscience,concurrencytheoryisreceivinga constantlyincreasinginterest.Thisisespeciallytrueforprocessalgebra.Althoughit had been originally conceived as a means for reasoning about the semantics of c- current programs, process algebraic formalisms like CCS, CSP, ACP, ?-calculus, and their extensions (see, e.g., [154,119,112,22,155,181,30]) were soon used also for comprehendingfunctionaland nonfunctionalaspects of the behaviorof com- nicating concurrent systems. The scienti?c impact of process calculi and behavioral equivalences at the base of process algebra is witnessed not only by a very rich literature. It is in fact worth mentioningthe standardizationprocedurethat led to the developmentof the process algebraic language LOTOS [49], as well as the implementation of several modeling and analysis tools based on process algebra, like CWB [70] and CADP [93], some of which have been used in industrial case studies. Furthermore, process calculi and behavioral equivalencesare by now adopted in university-levelcourses to teach the foundations of concurrent programming as well as the model-driven design of concurrent, distributed, and mobile systems. Nevertheless, after 30 years since its introduction, process algebra is rarely adopted in the practice of software development. On the one hand, its technica- ties often obfuscate the way in which systems are modeled. As an example, if a process term comprises numerous occurrences of the parallel composition operator, it is hard to understand the communicationscheme among the varioussubterms. On the other hand, process algebra is perceived as being dif?cult to learn and use by practitioners, as it is not close enough to the way they think of software systems.

User-Centric Networking - Future Perspectives (Hardcover, 2014 ed.): Alessandro Aldini, Alessandro Bogliolo User-Centric Networking - Future Perspectives (Hardcover, 2014 ed.)
Alessandro Aldini, Alessandro Bogliolo
R4,213 R2,064 Discovery Miles 20 640 Save R2,149 (51%) Ships in 12 - 17 working days

This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.

User-Centric Networking - Future Perspectives (Paperback, Softcover reprint of the original 1st ed. 2014): Alessandro Aldini,... User-Centric Networking - Future Perspectives (Paperback, Softcover reprint of the original 1st ed. 2014)
Alessandro Aldini, Alessandro Bogliolo
R2,508 Discovery Miles 25 080 Ships in 10 - 15 working days

This work represents a milestone for the "ULOOP User-centric Wireless Local Loop" project funded by the EU IST Seventh Framework Programme. ULOOP is focused on the robust, secure, and autonomic deployment of user-centric wireless networks. Contributions by ULOOP partners as well as invited tutorials by international experts in the field. The expected impact is to increase awareness to user-centric networking in terms, e.g., of business opportunities and quality of experience, and to present adequate technology to sustain the growth of user-friendly wireless architectures. Throughout the last 3 years, ULOOP has developed enabling technologies for user-centricity in wireless networks, with particular emphasis on social trust management, cooperation incentives, community building, mobility estimation, and resource management. This work will be of interest to researchers, policymakers, operators, vendors, and end-users interested in the current and future directions of user-centric access networks.

A Process Algebraic Approach to Software Architecture Design (Paperback, 2010 ed.): Alessandro Aldini, Marco Bernardo, Flavio... A Process Algebraic Approach to Software Architecture Design (Paperback, 2010 ed.)
Alessandro Aldini, Marco Bernardo, Flavio Corradini
R1,476 Discovery Miles 14 760 Ships in 10 - 15 working days

Inthe?eldofformalmethodsincomputerscience,concurrencytheoryisreceivinga constantlyincreasinginterest.Thisisespeciallytrueforprocessalgebra.Althoughit had been originally conceived as a means for reasoning about the semantics of c- current programs, process algebraic formalisms like CCS, CSP, ACP, ?-calculus, and their extensions (see, e.g., [154,119,112,22,155,181,30]) were soon used also for comprehendingfunctionaland nonfunctionalaspects of the behaviorof com- nicating concurrent systems. The scienti?c impact of process calculi and behavioral equivalences at the base of process algebra is witnessed not only by a very rich literature. It is in fact worth mentioningthe standardizationprocedurethat led to the developmentof the process algebraic language LOTOS [49], as well as the implementation of several modeling and analysis tools based on process algebra, like CWB [70] and CADP [93], some of which have been used in industrial case studies. Furthermore, process calculi and behavioral equivalencesare by now adopted in university-levelcourses to teach the foundations of concurrent programming as well as the model-driven design of concurrent, distributed, and mobile systems. Nevertheless, after 30 years since its introduction, process algebra is rarely adopted in the practice of software development. On the one hand, its technica- ties often obfuscate the way in which systems are modeled. As an example, if a process term comprises numerous occurrences of the parallel composition operator, it is hard to understand the communicationscheme among the varioussubterms. On the other hand, process algebra is perceived as being dif?cult to learn and use by practitioners, as it is not close enough to the way they think of software systems.

Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design VII - FOSAD 2012 / 2013 Tutorial Lectures (Paperback, 2014 ed.)
Alessandro Aldini, Javier Lopez, Fabio Martinelli
R2,255 Discovery Miles 22 550 Ships in 10 - 15 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.

Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures (Paperback, 2011): Alessandro Aldini, Roberto Gorrieri Foundations of Security Analysis and Design VI - FOSAD Tutorial Lectures (Paperback, 2011)
Alessandro Aldini, Roberto Gorrieri
R1,469 Discovery Miles 14 690 Ships in 10 - 15 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a timely spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to stimulate discussions and novel scientific collaborations. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2010 and August/September 2011. The topics covered in this book include privacy and data protection; security APIs; cryptographic verification by typing; model-driven security; noninterfer-quantitative information flow analysis; and risk analysis.

Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design - FOSAD 2006/2007 Turtorial Lectures (Paperback, 2007 ed.)
Alessandro Aldini, Roberto Gorrieri
R1,481 Discovery Miles 14 810 Ships in 10 - 15 working days

overviewofthebestindustrialpracticesinITsecurityanalysis.Inparticular, the paperpresentsrecentresearchresultsinthe areaofformalfoundations andpow- erfultoolsforsecurityanalysis.ThecontributionbyUlfarErlingssonoutlinesthe general issues of low-level software security. Concrete details of low-level attacks anddefensesaregiveninthe caseof CandC++softwarecompiledinto machine code. Fabio Martinelli and Paolo Mori describe a solution to improve the Java native security support. Two examples of the application of the proposed so- tion, with history-based monitoring of the application behavior, are given in the case of grid computing and mobile devices. The purpose of the chapter by Javier Lopez, Cristina Alcaraz, and Rodrigo Roman is to review and discuss critical information infrastructures, and show how to protect their functionalities and performance against attacks. As an example, the chapter also discusses the role of wireless sensor networks technology in the protection of these infrastructures. The paper by Liqun Chen is a survey in the area of asymmetric key cryp- graphic methodologies for identity-based cryptography. Audun Josang gives an overviewofthebackground, currentstatus, andfuturetrendoftrustandrepu- tionsystems.Inthefollowingchapter, MarcinCzenko, SandroEtalle, DongyiLi, and William H. Winsborough present the trust management approach to access controlindistributed systems.Inparticular, they focus onthe RT family ofro- based trust management languages. Chris Mitchell and Eimear Gallery report on the trusted computing technology for the next-generation mobile device

Foundations of Security Analysis and Design III - FOSAD 2004/2005 Tutorial Lectures (Paperback, 2005 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design III - FOSAD 2004/2005 Tutorial Lectures (Paperback, 2005 ed.)
Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli
R1,435 Discovery Miles 14 350 Ships in 10 - 15 working days

The increasing relevance of security to real-life applications, such as electronic commerce and Internet banking, is attested by the fast-growing number of - search groups, events, conferences, and summer schools that address the study of foundations for the analysis and the design of security aspects. The Int- national School on Foundations of Security Analysis and Design (FOSAD, see http: //www.sti.uniurb.it/events/fosad/)has been one of the foremost events - tablishedwiththegoalofdisseminatingknowledgeinthiscriticalarea, especially for young researchers approaching the ?eld and graduate students coming from less-favoured and non-leading countries. The FOSAD school is held annually at the Residential Centre of Bertinoro (http: //www.ceub.it/), in the fascinating setting of a former convent and ep- copal fortress that has been transformed into a modern conference facility with computing services and Internet access. Since the ?rst school, in 2000, FOSAD hasattractedmorethan250participantsand50lecturersfromallovertheworld. A collection of tutorial lectures from FOSAD 2000 was published in Springer s LNCS volume 2171. Some of the tutorials given at the two successive schools (FOSAD 2001 and 2002) are gathered in a second volume, LNCS 2946. To c- tinue this tradition, the present volume collects a set of tutorials fromthe fourth FOSAD, held in 2004, and from FOSAD 2005."

Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA... Data Privacy Management and Security Assurance - 11th International Workshop, DPM 2016 and 5th International Workshop, QASA 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings (Paperback, 1st ed. 2016)
Giovanni Livraga, Vicenc Torra, Alessandro Aldini, Fabio Martinelli, Neeraj Suri
R2,175 Discovery Miles 21 750 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 11th International Workshop on Data Privacy Management, DPM 2016 and the 5th International Workshop on Quantitative Aspects in Security Assurance, QASA 2016, held in Heraklion, Crete, Greece, in September 2016. 9 full papers and 4 short papers out of 24 submissions are included in the DPM 2016 Workshop. They are organized around areas related to the management of privacy-sensitive informations, such as translation of high-level business goals into system-level privacy policies; administration of sensitive identifiers; data integration and privacy engineering. The QASA workshop centeres around research topics with a particular emphasis on the techniques for service oriented architectures, including aspects of dependability, privacy, risk and trust. Three full papers and one short papers out of 8 submissions are included in QASA 2016.

Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures (Paperback, 1st ed. 2016): Alessandro... Foundations of Security Analysis and Design VIII - FOSAD 2014/2015/2016 Tutorial Lectures (Paperback, 1st ed. 2016)
Alessandro Aldini, Javier Lopez, Fabio Martinelli
R1,671 Discovery Miles 16 710 Ships in 10 - 15 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia and industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of four tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2014, 2015 and 2016. The topics covered in this book include zero-knowledge proof systems, JavaScript sandboxing, assessment of privacy, and distributed authorization.

Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA... Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015, and 4th International Workshop, QASA 2015, Vienna, Austria, September 21-22, 2015. Revised Selected Papers (Paperback, 1st ed. 2016)
Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Alessandro Aldini, Fabio Martinelli, Neeraj Suri
R3,621 Discovery Miles 36 210 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 10th International Workshop on Data Privacy Management, DPM 2015, and the 4th International Workshop on Quantitative Aspects in Security Assurance, QASA 2015, held in Vienna, Austria, in September 2015, co-located with the 20th European Symposium on Research in Computer Security, ESORICS 2015. In the DPM 2015 workshop edition, 39 submissions were received. In the end, 8 full papers, accompanied by 6 short papers, 2 position papers and 1 keynote were presented in this volume. The QASA workshop series responds to the increasing demand for techniques to deal with quantitative aspects of security assurance at several levels of the development life-cycle of systems and services, from requirements elicitation to run-time operation and maintenance. QASA 2015 received 11 submissions, of which 4 papers are presented in this volume as well.

Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th... Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance - 9th International Workshop, DPM 2014, 7th International Workshop, SETOP 2014, and 3rd International Workshop, QASA 2014, Wroclaw, Poland, September 10-11, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Joaquin Garcia-Alfaro, Jordi Herrera Joancomarti, Emil Lupu, Joachim Posegga, Alessandro Aldini, …
R2,462 Discovery Miles 24 620 Ships in 10 - 15 working days

This book constitutes the revised selected papers of the 9th International Workshop on Data Privacy Management, DPM 2014, the 7th International Workshop on Autonomous and Spontaneous Security, SETOP 2014, and the 3rd International Workshop on Quantitative Aspects in Security Assurance, held in Wroclaw, Poland, in September 2014, co-located with the 19th European Symposium on Research in Computer Security (ESORICS 2014). The volume contains 7 full and 4 short papers plus 1 keynote talk from the DPM workshop; 2 full papers and 1 keynote talk from the SETOP workshop; and 7 full papers and 1 keynote talk from the QASA workshop - selected out of 52 submissions. The papers are organized in topical sections on data privacy management; autonomous and spontaneous security; and quantitative aspects in security assurance.

Foundations of Security Analysis and Design V - FOSAD 2008/2009 Tutorial Lectures (Paperback, 2009 ed.): Alessandro Aldini,... Foundations of Security Analysis and Design V - FOSAD 2008/2009 Tutorial Lectures (Paperback, 2009 ed.)
Alessandro Aldini, Gilles Barthe, Roberto Gorrieri
R1,364 Discovery Miles 13 640 Ships in 10 - 15 working days

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Offering a good spectrum of current research in foundations of security, FOSAD also proposes panels dedicated to topical open problems, and giving presentations about ongoing work in the field, in order to favour discussions and novel scientific collaborations.

This book presents thoroughly revised versions of ten tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD 2007/2008/2009, held in Bertinoro, Italy, in September 2007, August 2008, and August/September 2009. The topics covered in this book include cryptographic protocol analysis, program and resource certification, identity management and electronic voting, access and authorization control, wireless security, mobile code and communications security.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
WTF - Capturing Zuma: A Cartoonist's…
Zapiro Zapiro, Mike Willis Paperback R295 R231 Discovery Miles 2 310
NIV Chronological Study Bible - Holy…
Thomas Nelson Hardcover R1,465 R1,156 Discovery Miles 11 560
The New Kingdom
Wilbur Smith, Mark Chadbourn Hardcover  (1)
R279 Discovery Miles 2 790
One Night, New York
Lara Thompson Paperback R454 R296 Discovery Miles 2 960
Geseend Is Die Wat Treur
Susan Jordaan Paperback R250 R215 Discovery Miles 2 150
It's Not How It Looks
Zapiro Paperback  (2)
R220 R172 Discovery Miles 1 720
Childe Harold's Pilgrimage
George Gordon Byron Paperback R628 Discovery Miles 6 280
Laat U Naam Geheilig Word - Leer Ken 24…
Este Geldenhuys Paperback R335 R288 Discovery Miles 2 880
Op Die Duiwel Se Spoor - Hoe Ek Die…
Ben "Bliksem" Booysen Paperback  (1)
R320 R275 Discovery Miles 2 750
Gala-Days
Gail Hamilton Paperback R591 Discovery Miles 5 910

 

Partners