Advanced Information Systems Engineering


Book Description

TheexplosivegrowthoftheInternetandtheWebhavecreatedanever-growing demand for information systems, and ever-growing challenges for Information Systems Engineering. The series of Conferences on Advanced Information S- tems Engineering (CAiSE) was launched in Scandinavia by Janis Bubenko and Arne Solvberg in 1989, became an important European conference, and was held annually in major European sites throughout the 1990s. Now, in its 14th year,CAiSEwasheldforthe?rsttimeoutsideEurope,showcasinginternational researchon information systems and their engineering. Not surprisingly, this year the conference enjoyed unprecedented attention. In total, the conference received 173 paper submissions, the highest number ever for a CAiSE conference. Of those, 42 were accepted as regular papers and 26 as short (poster) papers. In addition, the conference received 12 proposals for workshops of which 8 were approved, while 4 tutorials were selected from 15 submissions. The technical program was put together by an international committee of 81 experts. In total, 505 reviews were submitted, with every member of the committeecontributing.Decisionsonallsubmissionswerereachedataprogram committee meeting in Toronto on January 26-27,2002. Workshop and tutorial proposals were handled separately by committees chaired by Patrick Martin (workshops), and Jarek Gryz and Richard Paige (tutorials). We wish to extend a great “THANK YOU!” to all members of the program and organizing committees for their volunteer contributions of time and exp- tise. The fact that so many busy (and famous!) people took the trouble to help uswiththeorganizationofthisconferenceandtheformationofitstechnicalp- gram speaks well for the future of CAiSE and the ?eld of Information Systems Engineering.




Handbook of Research on Information Security and Assurance


Book Description

"This book offers comprehensive explanations of topics in computer system security in order to combat the growing risk associated with technology"--Provided by publisher.




Modelling and Verification of Secure Exams


Book Description

In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy that classifies exams by types and categories. Chapter 3 contains formal definitions of the authentication, privacy, and verifiability requirements for exams, a framework based on the applied pi-calculus for the specification of authentication and privacy, and a more abstract approach based on set-theory that enables the specification of verifiability. Chapter 4 describes the Huszti-Pethő protocol in detail and proposes a security enhancement. In Chap. 5 the author details Remark!, a protocol for Internet-based exams, discussing its cryptographic building blocks and some security considerations. Chapter 6 focuses on WATA, a family of computer-assisted exams that employ computer assistance while keeping face-to-face testing. The chapter also introduces formal definitions of accountability requirements and details the analysis of a WATA protocol against such definitions. In Chaps. 4, 5, and 6 the author uses the cryptographic protocol verifier ProVerif for the formal analyses. Finally, the author outlines future work in Chap. 7. The book is valuable for researchers and graduate students in the areas of information security, in particular for people engaged with exams or protocols.




Software Safety and Security


Book Description

Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol descriptions. There has also been something of a breakthrough in the area of operating system verification. This book presents the lectures from the NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security; a summer school held at Bayrischzell, Germany, in 2011. This Advanced Study Institute was divided into three integrated modules: Foundations of Safety and Security, Applications of Safety Analysis and Security Analysis. Subjects covered include mechanized game-based proofs of security protocols, formal security proofs, model checking, using and building an automatic program verifier and a hands-on introduction to interactive proofs. Bringing together many leading international experts in the field, this NATO Advanced Study Institute once more proved invaluable in facilitating the connections which will influence the quality of future research and the potential to transfer research into practice. This book will be of interest to all those whose work depends on the safety and security of software systems.




Formal Methods for the Quantitative Evaluation of Collective Adaptive Systems


Book Description

This book presents 8 tutorial lectures given by leading researchers at the 16th edition of the International School on Formal Methods for the Design of Computer, Communication and Software Systems, SFM 2016, held in Bertinoro, Italy, in June 2016. SFM 2016 was devoted to the Quantitative Evaluation of Collective Adaptive Systems and covered topics such as self-organization in distributed systems, scalable quantitative analysis, spatio-temporal models, and aggregate programming.




Software System Reliability and Security


Book Description

To make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering.




Operational Semantics and Verification of Security Protocols


Book Description

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool. The methodology’s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.




Declarative Programming and Knowledge Management


Book Description

This book constitutes revised selected papers from the 22nd International Conference on Applications of Declarative Programming and Knowledge Management, INAP 2019, the 33rd Workshop on Logic Programming, WLP 2019, and the 27th Workshop on Functional and (Constraint) Logic Programming, WFLP 2019. The 15 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 24 submissions. The contributions present current research activities in the areas of declarative languages and compilation techniques, in particular for constraint-based, logical and functional languages and their extensions, as well as discuss new approaches and key findings in constraint-solving, knowledge representation, and reasoning techniques.




Engineering Secure Two-Party Computation Protocols


Book Description

Secure two-party computation, called secure function evaluation (SFE), enables two mutually mistrusting parties, the client and server, to evaluate an arbitrary function on their respective private inputs while revealing nothing but the result. Originally the technique was considered to be too inefficient for practical privacy-preserving applications, but in recent years rapid speed-up in computers and communication networks, algorithmic improvements, automatic generation, and optimizations have enabled their application in many scenarios. The author offers an extensive overview of the most practical and efficient modern techniques used in the design and implementation of secure computation and related protocols. After an introduction that sets secure computation in its larger context of other privacy-enhancing technologies such as secure channels and trusted computing, he covers the basics of practically efficient secure function evaluation, circuit optimizations and constructions, hardware-assisted garbled circuit protocols, and the modular design of efficient SFE protocols. The goal of the author's research is to use algorithm engineering methods to engineer efficient secure protocols, both as a generic tool and for solving practical applications, and he achieves an excellent balance between the theory and applicability. The book is essential for researchers, students and practitioners in the area of applied cryptography and information security who aim to construct practical cryptographic protocols for privacy-preserving real-world applications.




Advanced Wireless Networks


Book Description

The third edition of this popular reference covers enabling technologies for building up 5G wireless networks. Due to extensive research and complexity of the incoming solutions for the next generation of wireless networks it is anticipated that the industry will select a subset of these results and leave some advanced technologies to be implemented later,. This new edition presents a carefully chosen combination of the candidate network architectures and the required tools for their analysis. Due to the complexity of the technology, the discussion on 5G will be extensive and it will be difficult to reach consensus on the new global standard. The discussion will have to include the vendors, operators, regulators as well as the research and academic community in the field. Having a comprehensive book will help many participants to join actively the discussion and make meaningful contribution to shaping the new standard.