WorldCat Identities

Stølen, Ketil

Overview
Works: 26 works in 103 publications in 2 languages and 1,652 library holdings
Genres: Conference papers and proceedings 
Roles: Author, Editor
Classifications: QA76.76.R44, 003
Publication Timeline
.
Most widely held works by Ketil Stølen
Specification and development of interactive systems : focus on streams, interfaces, and refinement by M Broy( Book )

8 editions published in 2001 in English and held by 189 WorldCat member libraries worldwide

Today's distributed systems are characterized by interactions, often complex, between many different hardware/software components cooperating and exchanging information. To reduce the complexity of the development of interactive systems, experts employ descriptions, or specifications, of a given system's behavior and/or structure. This book provides a mathematical and logical foundation for the specification and development of interactive systems based on a model that describes systems in terms of their input/output behavior. Based on the model, the authors build a basic method, called FOCUS, that enables interactive systems to be described by characterizing their histories of message interaction. The book progresses from an introduction and guided tour of FOCUS through streams, specifications and their properties, and behavioral, interface, and conditional refinements
Trust management : 4th international conference, iTrust 2006, Pisa, Italy, May 16-19, 2006 : proceedings by Ketil Stølen( Book )

15 editions published between 2005 and 2006 in English and Undetermined and held by 149 WorldCat member libraries worldwide

Model-driven risk analysis : the CORAS approach by Mass Soldal Lund( Book )

12 editions published between 2010 and 2014 in English and held by 54 WorldCat member libraries worldwide

The term 'risk' is known from many fields, and we are used to references to contractual risk, economic risk, operational risk, legal risk, security risk, and so forth. We conduct risk analysis, using either offensive or defensive approaches to identify and assess risk. Offensive approaches are concerned with balancing potential gain against risk of investment loss, while defensive approaches are concerned with protecting assets that already exist. In this book, Lund, Solhaug and Stolen focus on defensive risk analysis, and more explicitly on a particular approach called CORAS. CORAS is a model
Cyber-risk management by Atle Refsdal( Book )

5 editions published in 2015 in English and held by 14 WorldCat member libraries worldwide

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice
Specification and refinement of finite dataflow networks : a relational approach by M Broy( Book )

3 editions published in 1994 in English and held by 13 WorldCat member libraries worldwide

Abstract: "We specify the black box behavior of dataflow components by characterizing the relation between the input and the output histories. We distinguish between three main classes of such specifications, namely time independent specifications, weakly time dependent specifications and strongly time dependent specifications. Dataflow components are semantically modeled by sets of timed stream processing functions. Specifications describe such sets by logical formulas. We emphasize the treatment of the well-known fair merge problem and the Brock/Ackermann anomaly. We give refinement rules which allow specifications to be decomposed into networks of specifications."
An attempt to embed a restricted version of SDL as a target language in Focus by E Holz( Book )

3 editions published in 1994 in English and held by 13 WorldCat member libraries worldwide

Abstract: "This paper presents a first attempt to embed a restricted version of SDL as a target language in Focus. Brief introductions to both Focus and SDL are given, and it shown how both methods can be assigned a denotational semantics based on streams and stream processing functions. A set of Focus specifications, referred to as F-SDL, is characterized whose elements structurally and semantically match SDL specifications to such a degree that an automatic translation is almost straightforward. Finally it is outlined how Focus can be used to develop an SDL specification of a protocol."
Assumption/commitment rules for networks of asynchronously communicating agents by Ketil Stølen( Book )

4 editions published in 1993 in English and held by 11 WorldCat member libraries worldwide

In particular the feedback rules employ an invariant in the style of a traditional while-rule. Both sets of rules have been proved to be sound and also semantically complete with respect to a chosen set of composition operators. Conversion rules allow the two logics to be combined. This means that general specifications and the rules for general specifications have to be introduced only at the point in a system development where they are really needed. The proposed specification formalism and refinement rules together with a number of related design principles presented in [Bro92d], [Bro92a] constitute a powerful design method which allows distributed systems to be developed in the same style as methods like [Jon90], [Mor90] allow for the design of sequential systems."
A refinement relation supporting the transition from unbounded to bounded communication buffers by Ketil Stølen( Book )

3 editions published in 1994 in English and German and held by 9 WorldCat member libraries worldwide

Abstract: "This paper proposes a refinement relation supporting the transition from unbounded to bounded communication buffers. Employing this refinement relation, a system specification based on purely asynchronous communication can for example be refined into a system specification where the components communicate purely in terms of hand- shakes. First a weak version called partial refinement is introduced. Partial refinement guarantees only the preservation of safety properties. This refinement relation is then strengthened into total refinement which preserves both safety and liveness properties. Thus a total refinement is also a partial refinement. The suitability of this refinement relation for top-down design is discussed and some examples are given."
Development of a distributed min/max component by Max Fuchs( Book )

2 editions published in 1993 in English and held by 9 WorldCat member libraries worldwide

Abstract: "We introduce a specification technique and a refinement calculus for networks of components communicating asynchronously via unbounded FIFO channels. Specifications are formulated in a relational style. The given refinement rules allow network decomposition and interface refinement. We employ the proposed formalism to specify a so-called Min/Max Component. In a step-wise fashion we refine this specification into a functional program. Finally we outline how this program can be translated into SDL."
A denotational model for mobile many-to-many data-flow networks by Radu Grosu( Book )

4 editions published in 1996 in English and held by 8 WorldCat member libraries worldwide

Abstract: "We present a fully abstract, denotational model for mobile, timed, nondeterministic data-flow networks whose components communicate in a many-to-many fashion. In this model components and networks of components are represented by sets of stream processing functions. Each stream processing function is required to be strongly guarded and generic. A stream processing function is strongly guarded if it is contractive with respect to the standard metric on streams. This property guarantees the existence of unique fix-points. The genericity property can be thought of as an invariant, or alternatively, a privacy requirement, that is satisfied by any mobile system. It guarantees that a function never accesses, depends on or forwards a port whose name it does not already know. Our model allows the description of a wide variety of networks -- in particular, the description of unbounded nondeterministic networks. We demonstrate some features of our model by specifying a mobile telephone network."
A denotational model for mobile point to point dataflow networks by Radu Grosu( Book )

4 editions published in 1995 in English and held by 8 WorldCat member libraries worldwide

Abstract: "We present a denotational model for mobile, timed, unbounded nondeterministic dataflow networks whose components communicate in a point-to-point fashion. We first introduce a model for static, point- to-point dataflow networks. In this model components and networks of components are represented by sets of strongly pulse-driven stream processing functions. A stream processing function is strongly pulse- driven if its output until time j+1 is completely determined by its input until time j. This model is then extended to support mobility by allowing the components to communicate ports. In the mobile case, the functions are not only required to be strongly pulse-driven, but also to be generic in the sense that they do not read or write on channels whose ports they have not received or generated themselves. The model is shown to be fully abstract. We demonstrate the power and applicability of our model by specifying a mobile communication central."
A formal method for hardware/software co-design by Ketil Stølen( Book )

4 editions published in 1995 in English and held by 8 WorldCat member libraries worldwide

Abstract: "This paper presents a formal method supporting hardware/software codesign with respect to specification and verification. We introduce three different specification formats. Two of these are intended for the specification of asynchronous software; the third is more suited for digital hardware applications. All three formats are based on the assumption/commitment paradigm. We introduce a refinement relation and formulate verification rules for the parallel composition of specifications. We apply the proposed method to specify and decompose a timed FIFO queue which is partly to be implemented in hardware and partly to be implemented in software."
Assumption/Commitment rules for data-flow networks : with an emphasis on completeness by Ketil Stølen( Book )

4 editions published in 1995 in English and held by 8 WorldCat member libraries worldwide

Abstract: "During the last 15 years a large number of specification techniques based on the so-called assumption/commitment paradigm have been proposed. The formulation of verification rules for the composition of such specifications is known to be a difficult task. Most rules published so far impose strong constraints on the type of properties that can be expressed by the assumptions. Moreover, if completeness results are provided at all they are normally quite weak. We investigate these problems in the context of a model for data-flow networks."
Trust management 4th International Conference, iTrust 2006 : Pisa, Italy, May 16-19, 2006 : proceedings by ITrust( )

1 edition published in 2006 in English and held by 5 WorldCat member libraries worldwide

Trust management : 4th international conference, iTrust 2006, Pisa, Italy, May 16-19, 2006 ; proceedings( Visual )

1 edition published in 2006 in English and held by 5 WorldCat member libraries worldwide

Risk assessment and risk driven testing : First International Workshop, RISK 2013, Held in Conjunction with ICTSS 2013, Istanbul, Turkey, November 12, 2013 ; Revised Selected Papers by Thomas Bauer( Book )

4 editions published in 2014 in English and held by 2 WorldCat member libraries worldwide

This book constitutes the thoroughly refereed conference proceedings of the First International Workshop on Risk Assessment and Risk-driven Testing, RISK 2013, held in conjunction with 25th IFIP International Conference on Testing Software and Systems, ICTSS 2013, in Istanbul, Turkey, in November 2013. The revised full papers were carefully reviewed and selected from 13 submissions. The papers are organized in topical sections on Risk Analysis, Risk Modeling, and Risk-Based Testing
QoP'07 : proceedings of the 2007 ACM Workshop on Quality of Protection : Alexandria, Virginia, USA, October 29, 2007 by Quality of Protection Workshop( Book )

2 editions published in 2007 in English and held by 1 WorldCat member library worldwide

Trust Management (vol. # 3986) 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings by Ketil Stølen( Book )

6 editions published in 2006 in English and held by 1 WorldCat member library worldwide

Experiences from using the CORAS methodology to analyze a web application by F den Braber( Book )

4 editions published in 2005 in English and held by 1 WorldCat member library worldwide

Proceedings of the 4th ACM Workshop on Quality of Protection : October 27, 2008, Alexandria, Virginia, USA by Quality of Protection Workshop( )

1 edition published in 2008 in English and held by 0 WorldCat member libraries worldwide

Annotation
 
moreShow More Titles
fewerShow Fewer Titles
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.65 (from 0.05 for Experience ... to 0.89 for Specificat ...)

Specification and development of interactive systems : focus on streams, interfaces, and refinement
Alternative Names
Stølen, Ketil

Languages
English (88)

German (1)

Covers
Trust management : 4th international conference, iTrust 2006, Pisa, Italy, May 16-19, 2006 : proceedingsModel-driven risk analysis : the CORAS approachTrust management 4th International Conference, iTrust 2006 : Pisa, Italy, May 16-19, 2006 : proceedingsTrust management : 4th international conference, iTrust 2006, Pisa, Italy, May 16-19, 2006 ; proceedingsTrust Management (vol. # 3986) 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings