Dependable Computing


Book Description

This book constitutes the refereed proceedings of the Second Latin-American Symposium on Dependable Computing, LADC 2005, held in Salvador, Brazil, in October 2005. The 16 revised full papers presented together with 3 invited talks, and outlines of 2 workshops and 3 tutorials, were carefully reviewed and selected from 39 submissions. The papers are organized in topical sections on evaluation, certification, modelling, embedded systems, time, and distributed systems algorithms.




Privacy Enhancing Technologies


Book Description

This book constitutes the thoroughly refereed postproceedings of the 5th International Workshop on Privacy Enhancing Technologies, PET 2006, held in Cavtat, Croatia, in May and June 2005. The 17 revised full papers presented were carefully selected from 74 submissions during two rounds of reviewing and improvement. The papers address most current privacy enhancing technologies in various application contexts.




Information and Communications Security


Book Description

This book constitutes the refereed proceedings of the 9th International Conference on Information and Communications Security, ICICS 2007, held in Zhengzhou, China, in December 2007. The papers presented were carefully reviewed and selected. The papers are organized in topical sections on authentication and key exchange, digital signatures, applications, watermarking, fast implementations, applied cryptography, cryptanalysis, formal analysis, system security, and network security.




Trusted Computing Platforms


Book Description

The TCPA 1.0 specification finally makes it possible to build low-cost computing platforms on a rock-solid foundation of trust. In Trusted Computing Platforms, leaders of the TCPA initiative place it in context, offering essential guidance for every systems developer and decision-maker. They explain what trusted computing platforms are, how they work, what applications they enable, and how TCPA can be used to protect data, software environments, and user privacy alike.




Value-Range Analysis of C Programs


Book Description

Abu?erover?owoccurswheninputiswrittenintoamemorybu?erthatisnot large enough to hold the input. Bu?er over?ows may allow a malicious person to gain control over a computer system in that a crafted input can trick the defectiveprogramintoexecutingcodethatisencodedintheinputitself.They are recognised as one of the most widespread forms of security vulnerability, and many workarounds, including new processor features, have been proposed to contain the threat. This book describes a static analysis that aims to prove the absence of bu?er over?ows in C programs. The analysis is conservative in the sense that it locates every possible over?ow. Furthermore, it is fully automatic in that it requires no user annotations in the input program. Thekeyideaoftheanalysisistoinferasymbolicstateforeachp- gram point that describes the possible variable valuations that can arise at that point. The program is correct if the inferred values for array indices and pointer o?sets lie within the bounds of the accessed bu?er. The symbolic state consists of a ?nite set of linear inequalities whose feasible points induce a convex polyhedron that represents an approximation to possible variable valuations. The book formally describes how program operations are mapped to operations on polyhedra and details how to limit the analysis to those p- tionsofstructuresandarraysthatarerelevantforveri?cation.Withrespectto operations on string bu?ers, we demonstrate how to analyse C strings whose length is determined by anul character within the string.




Symmetric Cryptographic Protocols


Book Description

This book focuses on protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees.




Dependable Computing


Book Description

This book constitutes the refereed proceedings of the First Latin-American Symposium on Dependable Computing, LADC 2003, held in Sao Paulo, Brazil in October 2003. The 21 revised full papers presented together with abstracts of invited talks, a panel, workshops, and tutorials were carefully reviewed and selected for presentation. The papers are organized in topical sections on fault injection, security, adaptive fault tolerance, distributed algorithms, and components and fault tolerance.




Integrated Research in GRID Computing


Book Description

The aim of CoreGRID is to strengthen and advance scientific and technological excellence in the area of Grid and Peer-to-Peer technologies in order to overcome the current fragmentation and duplication of effort in this area. To achieve this objective, the workshop brought together a critical mass of well-established researchers from a number of institutions which have all constructed an ambitious joint program of activities. Priority in the workshop was given to work conducted in collaboration between partners from different research institutions and to promising research proposals that could foster such collaboration in the future.




Lossless Compression Handbook


Book Description

The 21 chapters in this handbook are written by the leading experts in the world on the theory, techniques, applications, and standards surrounding lossless compression. As with most applied technologies, the standards section is of particular importance to practicing design engineers. In order to create devices and communication systems that can communicate and be compatible with other systems and devices, standards must be followed.*Clearly explains the process of compression and transmission of multimedia signals *Invaluable resource for engineers dealing with image processing, signal processing, multimedia systems, wireless technology and more




Fundamentals of Stream Processing


Book Description

Stream processing is a novel distributed computing paradigm that supports the gathering, processing and analysis of high-volume, heterogeneous, continuous data streams, to extract insights and actionable results in real time. This comprehensive, hands-on guide combining the fundamental building blocks and emerging research in stream processing is ideal for application designers, system builders, analytic developers, as well as students and researchers in the field. This book introduces the key components of the stream computing paradigm, including the distributed system infrastructure, the programming model, design patterns and streaming analytics. The explanation of the underlying theoretical principles, illustrative examples and implementations using the IBM InfoSphere Streams SPL language and real-world case studies provide students and practitioners with a comprehensive understanding of such applications and the middleware that supports them.