01042nam2 22003013i 450 UFI000435720231121125903.0020103809920191010d1973 ||||0itac50 baengusz01i xxxe z01n1: Fundamental algorithmsDonald E. Knuth2. edReadingAddison-Wesley©1973XXI, 634 p.22 cm.001PUV00411542001 The art of computer programmingDonald E. Knuth1Knuth, Donald ErvinMILV10574007048274Knuth, Donald E.UFIV118098Knuth, Donald ErvinITIT-0120191010IT-FR0099 Biblioteca Area IngegneristicaFR0099 UFI0004357Biblioteca Area Ingegneristica 54S. L. 005.1 KNU I 54DII0000019755 VMB RS A 2005021520191009 54Fundamental algorithms122630UNICAS05729nam 22008775 450 99646552280331620200630143831.01-280-38563-497866135635523-642-11747-310.1007/978-3-642-11747-3(CKB)2670000000003386(SSID)ssj0000355494(PQKBManifestationID)11261334(PQKBTitleCode)TC0000355494(PQKBWorkID)10319764(PQKB)10805868(DE-He213)978-3-642-11747-3(MiAaPQ)EBC3065025(PPN)149057113(Association for Computing Machinery)10.5555/2175005(EXLCZ)99267000000000338620100301d2010 u| 0engurnn#008mamaatxtccrEngineering Secure Software and Systems Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings /edited by Fabio MASSACCI, Dan Wallach, Nicola Zannone1st ed. 2010.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2010.1 online resource (X, 241 p.)Security and Cryptology ;5965Bibliographic Level Mode of Issuance: Monograph3-642-11746-5 Includes bibliographical references and index.Session 1. Attack Analysis and Prevention I -- BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks -- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests -- Idea: Opcode-Sequence-Based Malware Detection -- Session 2. Attack Analysis and Prevention II -- Experiences with PDG-Based IFC -- Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications -- Idea: Towards Architecture-Centric Security Analysis of Software -- Session 3. Policy Verification and Enforcement I -- Formally-Based Black-Box Monitoring of Security Protocols -- Secure Code Generation for Web Applications -- Idea: Reusability of Threat Models – Two Approaches with an Experimental Evaluation -- Session 4. Policy Verification and Enforcement II -- Model-Driven Security Policy Deployment: Property Oriented Approach -- Category-Based Authorisation Models: Operational Semantics and Expressive Power -- Idea: Efficient Evaluation of Access Control Constraints -- Session 5. Secure System and Software Development I -- Formal Verification of Application-Specific Security Properties in a Model-Driven Approach -- Idea: Enforcing Consumer-Specified Security Properties for Modular Software -- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks -- Session 6. Secure System and Software Development II -- Automatic Generation of Smart, Security-Aware GUI Models -- Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems -- Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality.This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.Security and Cryptology ;5965ESSoS'10Computer communication systemsSoftware engineeringData encryption (Computer science)Data structures (Computer science)Computer science—MathematicsComputersComputer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Software Engineering/Programming and Operating Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I14002Cryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Math Applications in Computer Sciencehttps://scigraph.springernature.com/ontologies/product-market-codes/I17044Models and Principleshttps://scigraph.springernature.com/ontologies/product-market-codes/I18016Kongress.swdPisa (2010)swdComputer communication systems.Software engineering.Data encryption (Computer science).Data structures (Computer science).Computer science—Mathematics.Computers.Computer Communication Networks.Software Engineering/Programming and Operating Systems.Cryptology.Data Structures and Information Theory.Math Applications in Computer Science.Models and Principles.005.8SS 4800rvkMASSACCI Fabioedthttp://id.loc.gov/vocabulary/relators/edtWallach Danedthttp://id.loc.gov/vocabulary/relators/edtZannone Nicolaedthttp://id.loc.gov/vocabulary/relators/edtESSoS (Symposium)BOOK996465522803316Engineering Secure Software and Systems774151UNISA