|
|
Showing 1 - 8 of
8 matches in All Departments
It is, indeed, widely acceptable today that nowhere is it more
important to focus on the improvement of software quality than in
the case of systems with requirements in the areas of safety and
reliability - especially for distributed, real-time and embedded
systems. Thus, much research work is under progress in these
fields, since software process improvement impinges directly on
achieved levels of quality, and many application experiments aim to
show quantitative results demonstrating the efficacy of particular
approaches. Requirements for safety and reliability - like other
so-called non-functional requirements for computer-based systems -
are often stated in imprecise and ambiguous terms, or not at all.
Specifications focus on functional and technical aspects, with
issues like safety covered only implicitly, or not addressed
directly because they are felt to be obvious; unfortunately what is
obvious to an end user or system user is progressively less so to
others, to the extend that a software developer may not even be
aware that safety is an issue. Therefore, there is a growing
evidence for encouraging greater understanding of safety and
reliability requirements issues, right across the spectrum from end
user to software developer; not just in traditional safety-critical
areas (e.g. nuclear, aerospace) but also acknowledging the need for
such things as heart pacemakers and other medical and robotic
systems to be highly dependable.
|
Information Security and Privacy Research - 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012, Proceedings (Hardcover)
Dimitris Gritzalis, Steven Furnell, Marianthi Theoharidou
|
R2,764
Discovery Miles 27 640
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 27th IFIP TC
11 International Information Security Conference, SEC 2012, held in
Heraklion, Crete, Greece, in June 2012. The 42 revised full papers
presented together with 11 short papers were carefully reviewed and
selected from 167 submissions. The papers are organized in topical
sections on attacks and malicious code, security architectures,
system security, access control, database security, privacy
attitudes and properties, social networks and social engineering,
applied cryptography, anonymity and trust, usable security,
security and trust models, security economics, and authentication
and delegation.
|
Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Hardcover, 2009 ed.)
Dimitris Gritzalis, Javier Lopez
|
R2,725
Discovery Miles 27 250
|
Ships in 18 - 22 working days
|
It was an honor and a privilege to chair the 24th IFIP
International Information Se- rity Conference (SEC 2009), a
24-year-old event that has become a tradition for - formation
security professionals around the world. SEC 2009 was organized by
the Technical Committee 11 (TC-11) of IFIP, and took place in
Pafos, Cyprus, during May 18-20, 2009. It is an indication of good
fortune for a Chair to serve a conference that takes place in a
country with the natural beauty of Cyprus, an island where the
hospitality and frie- liness of the people have been going
together, hand-in-hand, with its long history. This volume contains
the papers selected for presentation at SEC 2009. In response to
the call for papers, 176 papers were submitted to the conference.
All of them were evaluated on the basis of their novelty and
technical quality, and reviewed by at least two members of the
conference Program Committee. Of the papers submitted, 39 were
selected for presentation at the conference; the acceptance rate
was as low as 22%, thus making the conference a highly competitive
forum. It is the commitment of several people that makes
international conferences pos- ble. That also holds true for SEC
2009. The list of people who volunteered their time and energy to
help is really long.
|
Cryptology and Network Security - 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings (Paperback, 2014 ed.)
Dimitris Gritzalis, Aggelos Kiayias, Ioannis Askoxylakis
|
R2,470
Discovery Miles 24 700
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 13th
International Conference on Cryptology and Network Security, CANS
2014, held in Heraklion, Creete, Greece, in October 2014. The 25
revised full papers presented together with the abstracts of 3
invited talks were carefully reviewed and selected from 86
submissions. The papers cover topics of interest such as
encryption; cryptanalysis; malware analysis; and privacy and
identification systems as well as various types of network protocol
design and analysis work.
It is, indeed, widely acceptable today that nowhere is it more
important to focus on the improvement of software quality than in
the case of systems with requirements in the areas of safety and
reliability - especially for distributed, real-time and embedded
systems. Thus, much research work is under progress in these
fields, since software process improvement impinges directly on
achieved levels of quality, and many application experiments aim to
show quantitative results demonstrating the efficacy of particular
approaches. Requirements for safety and reliability - like other
so-called non-functional requirements for computer-based systems -
are often stated in imprecise and ambiguous terms, or not at all.
Specifications focus on functional and technical aspects, with
issues like safety covered only implicitly, or not addressed
directly because they are felt to be obvious; unfortunately what is
obvious to an end user or system user is progressively less so to
others, to the extend that a software developer may not even be
aware that safety is an issue. Therefore, there is a growing
evidence for encouraging greater understanding of safety and
reliability requirements issues, right across the spectrum from end
user to software developer; not just in traditional safety-critical
areas (e.g. nuclear, aerospace) but also acknowledging the need for
such things as heart pacemakers and other medical and robotic
systems to be highly dependable.
|
Critical Information Infrastructure Security - 6th International Workshop, CRITIS 2011, Lucerne, Switzerland, September 8-9, 2011, Revised Selected Papers (Paperback, 2013 ed.)
Sandro Bologna, Bernhard Hammerli, Dimitris Gritzalis, Stephen Wolthusen
|
R1,294
Discovery Miles 12 940
|
Ships in 18 - 22 working days
|
This book constitutes revised selected papers from the 6th
International Workshop on Critical Information Infrastructure
Security, CRITIS 2011, held in Lucerne, Switzerland, in September
2011. The 16 full papers and 6 short papers presented in this
volume were carefully reviewed and selected from 38 submissions.
They deal with all areas of critical infrastructure protection
research.
|
Emerging Challenges for Security, Privacy and Trust - 24th IFIP TC 11 International Information Security Conference, SEC 2009, Pafos, Cyprus, May 18-20, 2009, Proceedings (Paperback, Softcover reprint of hardcover 1st ed. 2009)
Dimitris Gritzalis, Javier Lopez
|
R2,697
Discovery Miles 26 970
|
Ships in 18 - 22 working days
|
It was an honor and a privilege to chair the 24th IFIP
International Information Se- rity Conference (SEC 2009), a
24-year-old event that has become a tradition for - formation
security professionals around the world. SEC 2009 was organized by
the Technical Committee 11 (TC-11) of IFIP, and took place in
Pafos, Cyprus, during May 18-20, 2009. It is an indication of good
fortune for a Chair to serve a conference that takes place in a
country with the natural beauty of Cyprus, an island where the
hospitality and frie- liness of the people have been going
together, hand-in-hand, with its long history. This volume contains
the papers selected for presentation at SEC 2009. In response to
the call for papers, 176 papers were submitted to the conference.
All of them were evaluated on the basis of their novelty and
technical quality, and reviewed by at least two members of the
conference Program Committee. Of the papers submitted, 39 were
selected for presentation at the conference; the acceptance rate
was as low as 22%, thus making the conference a highly competitive
forum. It is the commitment of several people that makes
international conferences pos- ble. That also holds true for SEC
2009. The list of people who volunteered their time and energy to
help is really long.
|
Information Security Practice and Experience - 17th International Conference, ISPEC 2022, Taipei, Taiwan, November 23-25, 2022, Proceedings (Paperback, 1st ed. 2022)
Chunhua Su, Dimitris Gritzalis, Vincenzo Piuri
|
R2,524
Discovery Miles 25 240
|
Ships in 18 - 22 working days
|
This book constitutes the refereed proceedings of the 17th
International Conference on Information Security Practice and
Experience, ISPEC 2022, held in Taipei, Taiwan, in November 2022.
The 33 full papers together with 2 invited papers included in this
volume were carefully reviewed and selected from 87 submissions.
The main goal of the conference is to promote research on new
information security technologies, including their applications and
their integration with IT systems in various vertical sectors.
|
You may like...
Spanish Phrases
Joseph Levi, Elizabeth Ronne
Fold-out book or chart
R633
Discovery Miles 6 330
|