|
|
Showing 1 - 2 of
2 matches in All Departments
This volume contains the papers presented. at the Third IFIP
International Working Conference on Dependable Computing for
Critical Applications, sponsored by IFIP Working Group 10.4 and
held in Mondello (Sicily), Italy on September 14-16, 1992. System
developers increasingly apply computers where they can affect the
safety and security of people and equipment. The Third IFIP
International Working Conference on Dependable Computing for
Critical Applications, like its predecessors, addressed various
aspects of computer system dependability, a broad term defined as
the degree of trust that may justifiably be placed in a system's
reliability, availability, safety, security, and performance.
Because the scope of the conference was so broad, we hope the
presentations and discussions will contribute to the integration of
these concepts so that future computer-based systems will indeed be
more dependable. The Program Committee selected 18 papers for
presentation from a total of 7 4 submissions at a May meeting in
Newcastle upon Tyne, UK. The resulting program represented a broad
spectrum of interests, with papers from universities, corporations,
and government agencies in eight countries. Much diligent work by
the Program Committee and the quality of reviews from more than a
hundred external referees from around the world, for which we are
most grateful, significantly eased the production of this technical
program.
This Festschrift volume is published in honor of Catherine A.
Meadows and contains essays presented at the Catherine Meadows
Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.
Catherine A. Meadows has been a pioneer in developing symbolic
formal verification methods and tools. Her NRL Protocol Analyzer, a
tool and methodology that embodies symbolic model checking
techniques, has been fruitfully applied to the analysis of many
protocols and protocol standards and has had an enormous influence
in the field. She also developed a new temporal logic to specify
protocol properties, as well as new methods for analyzing various
kinds of properties beyond secrecy such as authentication and
resilience under Denial of Service (DoS) attacks and has made
important contributions in other areas such as wireless protocol
security, intrusion detection, and the relationship between
computational and symbolic approaches to cryptography. This volume
contains 14 contributions authored by researchers from Europe and
North America. They reflect on the long-term evolution and future
prospects of research in cryptographic protocol specification and
verification.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Midnights
Taylor Swift
CD
R505
Discovery Miles 5 050
Babylon
Brad Pitt, Margot Robbie, …
Blu-ray disc
R271
Discovery Miles 2 710
Personal Shopper
Kristen Stewart, Nora von Waldstätten, …
DVD
R184
Discovery Miles 1 840
|