Gilles Barthe, Benjamin Gregoire, Marieke Huisman, Jean-Luis Lanet
This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of Safe, Secure, and Interoperable Smart Devices, CASSIS 2005. The 9 revised full papers presented were carefully selected during two rounds of reviewing and improvement from about 30 workshop talks. The papers are organized in topical sections on research trends in smart devices, Web services, virtual machine technology, security, validation and formal methods, proof-carrying code, and embedded devices.
This book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of Safe, Secure, and Interope...
This volume contains the proceedings of the 11th International Conference on Veri?cation, Model Checking, and Abstract Interpretation (VMCAI 2010), held in Madrid, Spain, January 17-19, 2010. VMCAI 2010 was the 11th in a series of meetings. Previous meetings were held in Port Je?erson (1997), Pisa (1998), Venice (2002), New York (2003), Venice(2004), Paris(2005), Charleston(2006), Nice(2007), SanFrancisco(2008), and Savannah (2009). VMCAI centers on state-of-the-art research relevant to analysis of programs and systems and drawn from three research communities: veri?cation, model checking,...
This volume contains the proceedings of the 11th International Conference on Veri?cation, Model Checking, and Abstract Interpretation (VMCAI 2010), he...
Jorge Cuellar, Javier Lopez, Gilles Barthe, Alexander Pretschner
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010, held in Athens, Greece, in September 2010. The 17 revised full papers presented were carefully reviewed and selected from 40 submissions. Focusing on high-quality original unpublished research, case studies, and implementation experiences, STM 2010 encouraged submissions discussing the application and deployment of security technologies in practice.
This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Workshop on Security and Trust Management, STM 2010...
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, FAST 2011, held in conjunction with the 16th European Symposium on Research in Computer Security, ESORICS 2011, in Leuven, Belgium in September 2011. The 15 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 42 submissions. The papers focus on security and trust policy models; security protocol design and analysis; formal models of trust and reputation; logics for security and trust; distributed...
This book constitutes the thoroughly refereed post-conference proceedings of the 8th International Workshop on Formal Aspects of Security and Trust, F...
Gilles Barthe, Joost-Pieter Katoen (RWTH Aachen University, Germany), Alexandra Silva (University College London)
What does a probabilistic program actually compute? How can one formally reason about such probabilistic programs? This valuable guide covers such elementary questions and more. It provides a state-of-the-art overview of the theoretical underpinnings of modern probabilistic programming and their applications in machine learning, security, and other domains, at a level suitable for graduate students and non-experts in the field. In addition, the book treats the connection between probabilistic programs and mathematical logic, security (what is the probability that software leaks confidential...
What does a probabilistic program actually compute? How can one formally reason about such probabilistic programs? This valuable guide covers such ele...