You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 9th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2007, held in Paris, France, November 14-16, 2007. The 27 regular papers presented together with the extended abstracts of three invited lectures were carefully reviewed and selected from 64 submissions. The papers address all aspects of self-stabilization, safety and security, recovery oriented systems and programming.
This book constitutes the refereed proceedings of the 8th International Symposium on Stabilization, Safety, and Security of Distributed Systems, SSS 2006, held in Dallas, TX, USA in November 2006. The 36 revised full papers and 12 revised short papers presented together with the extended abstracts of 2 invited lectures address all aspects of self-stabilization, safety and security, recovery oriented systems and programming.
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host’s main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process – an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. T...
This book constitutes the refereed proceedings of the Second International Colloquium on Theoretical Aspects of Computing, ICTAC 2005 held in Hanoi, Vietnam, in October 2005. The 35 revised full papers presented together with 5 invited talks and a summary of 5 tutorials were carefully reviewed and selected from 122 submissions. The papers are organized in topical sections on formal languages, computer science logics, program construction, real-time systems, concurrency and refinement, software security, quantitative logics, object-orientation and component systems, model-checking and algorithms, and applied logics and computing theory.
This book constitutes the refereed post-proceedings of the 9th International Conference on Principles of Distributed Systems, OPODIS 2005, held in Pisa, Italy in December 2005. The volume presents 30 revised full papers and abstracts of 2 invited talks. The papers are organized in topical sections on nonblocking synchronization, fault-tolerant broadcast and consensus, self-stabilizing systems, peer-to-peer systems and collaborative environments, sensor networks and mobile computing, security and verification, real-time systems, and peer-to-peer systems.
Foreword from the Program Chairs These proceedings contain the papers selected for presentation at the 10th - ropean Symposium on Research in Computer Security (ESORICS), held S- tember 12–14, 2005 in Milan, Italy. In response to the call for papers 159 papers were submitted to the conf- ence. These paperswere evaluated on the basis of their signi?cance, novelty,and technical quality. Each paper was reviewed by at least three members of the program committee. The program committee meeting was held electronically, holding intensive discussion over a period of two weeks. Of the papers subm- ted, 27 were selected for presentation at the conference, giving an acceptance rate of about 16%. The ...
This book constitutes the refereed proceedings of the 22nd International Symposium on Distributed Computing, DISC 2008, held in Arcachon, France, in September 2008. The 33 revised full papers, selected from 101 submissions, are presented together with 11 brief announcements of ongoing works; all of them were carefully reviewed and selected for inclusion in the book. The papers address all aspects of distributed computing, including the theory, design, implementation and applications of distributed algorithms, systems and networks - ranging from foundational and theoretical topics to algorithms and systems issues and to applications in various fields.
This 2-volume set constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Security and Privacy in Communication Networks, SecureComm 2014, held in Beijing, China, in September 2014. The 27 regular and 17 short papers presented were carefully reviewed. It also presents 22 papers accepted for four workshops (ATCS, SSS, SLSS, DAPRO) in conjunction with the conference, 6 doctoral symposium papers and 8 poster papers. The papers are grouped in the following topics: security and privacy in wired, wireless, mobile, hybrid, sensor, ad hoc networks; network intrusion detection and prevention, firewalls, packet filters; malware, and distributed denial of service; communication privacy and anonymity; network and internet forensics techniques; public key infrastructures, key management, credential management; secure routing, naming/addressing, network management; security and privacy in pervasive and ubiquitous computing; security & privacy for emerging technologies: VoIP, peer-to-peer and overlay network systems; security & isolation in data center networks; security & isolation in software defined networking.
Anomaly detection has been a long-standing security approach with versatile applications, ranging from securing server programs in critical environments, to detecting insider threats in enterprises, to anti-abuse detection for online social networks. Despite the seemingly diverse application domains, anomaly detection solutions share similar technical challenges, such as how to accurately recognize various normal patterns, how to reduce false alarms, how to adapt to concept drifts, and how to minimize performance impact. They also share similar detection approaches and evaluation methods, such as feature extraction, dimension reduction, and experimental evaluation. The main purpose of this b...
This book constitutes the refereed proceedings of the IFIP Conference on Wireless Sensors and Actor Networks held in Ottawa, Canada, July, 2008. This series publishes state-of-the-art results in the sciences and technologies of information and communication. The scope of the series includes: foundations of computer science; software theory and practice; education; computer applications in technology; communication systems; systems modeling and optimization; information systems; computers and society; computer systems technology; security and protection in information processing systems; artificial intelligence; and human-computer interaction. Proceedings and post-proceedings of refereed international conferences in computer science and interdisciplinary fields are featured. These results often precede journal publication and represent the most current research. The principal aim of the IFIP series is to encourage education and the dissemination and exchange of information about all aspects of computing.