Modelling and Verification of Secure Exams

Modelling and Verification of Secure Exams PDF Author: Rosario Giustolisi
Publisher: Springer
ISBN: 3319671073
Category : Computers
Languages : en
Pages : 144

Get Book Here

Book Description
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy that classifies exams by types and categories. Chapter 3 contains formal definitions of the authentication, privacy, and verifiability requirements for exams, a framework based on the applied pi-calculus for the specification of authentication and privacy, and a more abstract approach based on set-theory that enables the specification of verifiability. Chapter 4 describes the Huszti-Pethő protocol in detail and proposes a security enhancement. In Chap. 5 the author details Remark!, a protocol for Internet-based exams, discussing its cryptographic building blocks and some security considerations. Chapter 6 focuses on WATA, a family of computer-assisted exams that employ computer assistance while keeping face-to-face testing. The chapter also introduces formal definitions of accountability requirements and details the analysis of a WATA protocol against such definitions. In Chaps. 4, 5, and 6 the author uses the cryptographic protocol verifier ProVerif for the formal analyses. Finally, the author outlines future work in Chap. 7. The book is valuable for researchers and graduate students in the areas of information security, in particular for people engaged with exams or protocols.

Modelling and Verification of Secure Exams

Modelling and Verification of Secure Exams PDF Author: Rosario Giustolisi
Publisher: Springer
ISBN: 3319671073
Category : Computers
Languages : en
Pages : 144

Get Book Here

Book Description
In this book the author introduces a novel approach to securing exam systems. He provides an in-depth understanding, useful for studying the security of exams and similar systems, such as public tenders, personnel selections, project reviews, and conference management systems. After a short chapter that explains the context and objectives of the book, in Chap. 2 the author introduces terminology for exams and the foundations required to formulate their security requirements. He describes the tasks that occur during an exam, taking account of the levels of detail and abstraction of an exam specification and the threats that arise out of the different exam roles. He also presents a taxonomy that classifies exams by types and categories. Chapter 3 contains formal definitions of the authentication, privacy, and verifiability requirements for exams, a framework based on the applied pi-calculus for the specification of authentication and privacy, and a more abstract approach based on set-theory that enables the specification of verifiability. Chapter 4 describes the Huszti-Pethő protocol in detail and proposes a security enhancement. In Chap. 5 the author details Remark!, a protocol for Internet-based exams, discussing its cryptographic building blocks and some security considerations. Chapter 6 focuses on WATA, a family of computer-assisted exams that employ computer assistance while keeping face-to-face testing. The chapter also introduces formal definitions of accountability requirements and details the analysis of a WATA protocol against such definitions. In Chaps. 4, 5, and 6 the author uses the cryptographic protocol verifier ProVerif for the formal analyses. Finally, the author outlines future work in Chap. 7. The book is valuable for researchers and graduate students in the areas of information security, in particular for people engaged with exams or protocols.

Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification

Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification PDF Author: Simon Collart-Dutilleul
Publisher: Springer
ISBN: 3030187446
Category : Computers
Languages : en
Pages : 304

Get Book Here

Book Description
This book constitutes the refereed proceedings of the Third International Conference on Reliability, Safety, and Security of Railway Systems, RSSRail 2019, held in Lille, France in June 2019. The 18 full papers presented in this book were carefully reviewed and selected from 38 submissions. They cover a range of topics including railways system and infrastructure advance modelling; scheduling and track planning; safety process and validation; modelling; formal verification; and security.

Foundations of Security Analysis and Design VII

Foundations of Security Analysis and Design VII PDF Author: Alessandro Aldini
Publisher: Springer
ISBN: 3319100823
Category : Computers
Languages : en
Pages : 290

Get Book Here

Book Description
FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.

Financial Cryptography and Data Security

Financial Cryptography and Data Security PDF Author: Radu Sion
Publisher: Springer Science & Business Media
ISBN: 364214991X
Category : Computers
Languages : en
Pages : 262

Get Book Here

Book Description
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance.

Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification

Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification PDF Author: Thierry Lecomte
Publisher: Springer
ISBN: 3319339516
Category : Computers
Languages : en
Pages : 261

Get Book Here

Book Description
This book constitutes the refereed proceedings of the FirstInternational Conference on Reliability, Safety, and Security of RailwaySystems, RSSRail 2016, held in Paris, France, in June 2016. The 15 revised full papers presented were carefully reviewed andselected from 36 initial submissions. The papers cover a wide range oftopics including failure analysis, interlocking verification, formalsystem specification and refinement, security analysis of ERTMS, safetyverification, formalisation of requirements, proof automation,operational security, railway system reliability, risk assessment forERTMS, and verification of EN-50128 safety requirements.

Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications

Leveraging Applications of Formal Methods, Verification and Validation. Specialized Techniques and Applications PDF Author: Tiziana Margaria
Publisher: Springer
ISBN: 3662452316
Category : Computers
Languages : en
Pages : 661

Get Book Here

Book Description
The two-volume set LNCS 8802 and LNCS 8803 constitutes the refereed proceedings of the 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2014, held in Imperial, Corfu, Greece, in October 2014. The total of 67 full papers was carefully reviewed and selected for inclusion in the proceedings. Featuring a track introduction to each section, the papers are organized in topical sections named: evolving critical systems; rigorous engineering of autonomic ensembles; automata learning; formal methods and analysis in software product line engineering; model-based code generators and compilers; engineering virtualized systems; statistical model checking; risk-based testing; medical cyber-physical systems; scientific workflows; evaluation and reproducibility of program analysis; processes and data integration in the networked healthcare; semantic heterogeneity in the formal development of complex systems. In addition, part I contains a tutorial on automata learning in practice; as well as the preliminary manifesto to the LNCS Transactions on the Foundations for Mastering Change with several position papers. Part II contains information on the industrial track and the doctoral symposium and poster session.

Computer Safety, Reliability, and Security

Computer Safety, Reliability, and Security PDF Author: Amund Skavhaug
Publisher: Springer
ISBN: 3319454803
Category : Computers
Languages : en
Pages : 408

Get Book Here

Book Description
This book constitutes the refereed proceedings of four workshops co-located with SAFECOMP 2016, the 35th International Conference on Computer Safety, Reliability, and Security, held in Trondheim, Norway, in September 2016. The 30 revised full papers presented together with 4 short and 5 invited papers were carefully reviewed and selected from numerous submissions. This year’s workshop are: ASSURE 2016 - Assurance Cases for Software-intensive Systems; DECSoS 2016 - EWICS/ERCIM/ARTEMIS Dependable Cyber-physical Systems and Systems-of-Systems Workshop; SASSUR 2016 - Next Generation of System Assurance Approaches for Safety-Critical Systems; and TIPS 2016 – Timing Performance in Safety Engineering.

Security, Privacy, and Anonymity in Computation, Communication, and Storage

Security, Privacy, and Anonymity in Computation, Communication, and Storage PDF Author: Guojun Wang
Publisher: Springer
ISBN: 303024900X
Category : Computers
Languages : en
Pages : 340

Get Book Here

Book Description
This book constitutes the refereed proceedings of six symposiums and two workshops co-located with SpaCCS 2019, the 12th International Conference on Security, Privacy, and Anonymity in Computation, Communication, and Storage. The 26 full papers were carefully reviewed and selected from 75 submissions. This year's symposiums and workshops are: SPIoT 2019 – Security and Privacy of Internet of Things; TSP 2019 – Trust, Security and Privacy for Emerging Applications; SCS 2019 – Sensor-Cloud Systems; UbiSafe 2019 – UbiSafe Computing; ISSR 2019 – Security in e-Science and e-Research; CMRM 2019 – Cybersecurity Metrics and Risk Modeling.

Deployable Machine Learning for Security Defense

Deployable Machine Learning for Security Defense PDF Author: Gang Wang
Publisher: Springer Nature
ISBN: 3030878392
Category : Computers
Languages : en
Pages : 163

Get Book Here

Book Description
This book constitutes selected and extended papers from the Second International Workshop on Deployable Machine Learning for Security Defense, MLHat 2021, held in August 2021. Due to the COVID-19 pandemic the conference was held online. The 6 full papers were thoroughly reviewed and selected from 7 qualified submissions. The papers are organized in topical sections on machine learning for security, and malware attack and defense.

Information Security and Cryptology -- ICISC 2012

Information Security and Cryptology -- ICISC 2012 PDF Author: Taekyoung Kwon
Publisher: Springer
ISBN: 3642376827
Category : Computers
Languages : en
Pages : 525

Get Book Here

Book Description
This book constitutes the thoroughly refereed post-conference proceedings of the 15th International Conference on Information Security and Cryptology, ICISC 2012, held in Seoul, Korea, in November 2012. The 32 revised full papers presented together with 3 invited talks were carefully selected from 120 submissions during two rounds of reviewing. The papers provide the latest results in research, development, and applications in the field of information security and cryptology. They are organized in topical sections on attack and defense, software and Web security, cryptanalysis, cryptographic protocol, identity-based encryption, efficient implementation, cloud computing security, side channel analysis, digital signature, and privacy enhancement.