Formal Logical Methods for System Security and Correctness


Book Description

Offers information in the field of proof technology in connection with secure and correct software. This title shows that methods of correct-by-construction program and process synthesis allow a high level programming method more amenable to security and reliability analysis and guarantees.




Logics and Languages for Reliability and Security


Book Description

Software-intensive systems are today an integral part of many everyday products. Whilst they provide great benefits regarding ease of use and allow for new applications, they also impose enormous responsibilities. It is vital to ensure that such applicati




IoT Enabled-DC Microgrids


Book Description

Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources. Microgrid technology allows the integration of renewable energies, which come in three modes: AC, DC, or hybrid. The increasing number of DC loads, the need to reduce power loss in converting DC power to AC, and the existence of DC storage units have favored the adoption of DC microgrids. The electrification of the transportation sector has further supported the adoption of DC microgrids. A DC microgrid system comprises renewable resources, DC storage elements, DC loads, and intelligent electrical devices. It has gained interest due to its efficiency, scalability, and cost-effectiveness. DC microgrids play a crucial role in powering diverse applications such as data centers, residential areas, base stations, and electric vehicle charging stations. This book covers the design, control, and management of DC microgrids in both islanded and grid-connected modes. It focuses on ICT infrastructure, security, sensors, embedded systems, machine learning algorithms, edge/fog computing, and the socio-economic impact.




Cryptographic Protocol


Book Description

"Cryptographic Protocol: Security Analysis Based on Trusted Freshness" mainly discusses how to analyze and design cryptographic protocols based on the idea of system engineering and that of the trusted freshness component. A novel freshness principle based on the trusted freshness component is presented; this principle is the basis for an efficient and easy method for analyzing the security of cryptographic protocols. The reasoning results of the new approach, when compared with the security conditions, can either establish the correctness of a cryptographic protocol when the protocol is in fact correct, or identify the absence of the security properties, which leads the structure to construct attacks directly. Furthermore, based on the freshness principle, a belief multiset formalism is presented. This formalism’s efficiency, rigorousness, and the possibility of its automation are also presented. The book is intended for researchers, engineers, and graduate students in the fields of communication, computer science and cryptography, and will be especially useful for engineers who need to analyze cryptographic protocols in the real world. Dr. Ling Dong is a senior engineer in the network construction and information security field. Dr. Kefei Chen is a Professor at the Department of Computer Science and Engineering, Shanghai Jiao Tong University.




Security and Fault Tolerance in Internet of Things


Book Description

This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.




Personal Wireless Communications


Book Description

The International conference on Personal Wireless Communications (PWC 2007) was the twelfth conference of its series aimed at stimulating technical exchange between researchers, practitioners and students interested in mobile computing and wireless networks. The program covered a variety of research topics that are of current interest, including Ad-Hoc Networks, WiMAX, Heterogeneous Networks, Wireless Networking, QoS and Security, Sensor Networks, Multicast and Signal processing.







Embedded Systems Technology


Book Description

This book constitutes the refereed proceedings of the 15th National Conference on Embedded Systems Technology, ESTC 2017, held in Shenyang, China, in November 2017. The 18 revised full papers presented were carefully reviewed and selected from 45 papers. The topics cover a broad range of fields focusing on the theme "embedded systems and intelligent computing," such as context aware computing, scheduling, cyber physical system, high performance embedded computing, embedded system and applications, and education and surveys.




Safety and Security of Cyber-Physical Systems


Book Description

Cyber-physical systems (CPSs) consist of software-controlled computing devices communicating with each other and interacting with the physical world through sensors and actuators. Because most of the functionality of a CPS is implemented in software, the software is of crucial importance for the safety and security of the CPS. This book presents principle-based engineering for the development and operation of dependable software. The knowledge in this book addresses organizations that want to strengthen their methodologies to build safe and secure software for mission-critical cyber-physical systems. The book: • Presents a successful strategy for the management of vulnerabilities, threats, and failures in mission-critical cyber-physical systems; • Offers deep practical insight into principle-based software development (62 principles are introduced and cataloged into five categories: Business & organization, general principles, safety, security, and risk management principles); • Provides direct guidance on architecting and operating dependable cyber-physical systems for software managers and architects.




Handbook of Research on Information Security and Assurance


Book Description

"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher.




Recent Books