Explore the latest books of this year!
Bookbot

Ali E. Abdallah

    Formal aspects of security
    Communicating sequential processes
    • Communicating sequential processes

      • 321 pages
      • 12 hours of reading

      This volume commemorates the semi-jubilee of Communicating Sequential Processes, inspired by Tony Hoare’s seminal paper, which is considered one of the most influential in computer science. To honor this work, an event was organized by BCS-FACS, the British Computer Society’s Formal Aspects of Computing Science specialist group. CSP25 was part of a series aimed at showcasing formal methods, their relevance to modern computing, and promoting broader application. The event took place on July 7–8, 2004, at London South Bank University’s Institute for Computing Research. It celebrated and reflected on CSP’s contributions to computer science over its first quarter-century. The meeting explored CSP's impact across various fields, including semantics for understanding concurrency, logic for reasoning about behavior, and the design of parallel programming languages addressing I/O, synchronization, and threads. Applications discussed ranged from distributed software and parallel computing to information security and concurrent hardware circuits. Highlights included a panel discussion with notable figures such as Brookes, Hoare, de Roever, and Roscoe, poster presentations by PhD students, and a memorable fire alarm evacuation. The event concluded with the presentation of a fountain pen to Prof. Sir C. A. R. Hoare.

      Communicating sequential processes
    • Formal aspects of security

      • 239 pages
      • 9 hours of reading

      This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Formal Aspects of Security, FASec 2002, held in London, UK, in December 2002. The 11 revised full papers presented together with 7 invited contributions were carefully reviewed, selected, and improved for inclusion in the book. The papers are organized in topical sections on protocol verification, analysis of protocols, security modelling and reasoning, and intrusion detection systems and liveness.

      Formal aspects of security