LEADER 06369nam 22008295 450 001 9910144339803321 005 20240521221952.0 010 $a3-540-37621-6 024 7 $a10.1007/b101397 035 $a(CKB)1000000000212617 035 $a(SSID)ssj0000248170 035 $a(PQKBManifestationID)11224108 035 $a(PQKBTitleCode)TC0000248170 035 $a(PQKBWorkID)10200173 035 $a(PQKB)11246050 035 $a(MiAaPQ)EBC3088702 035 $a(DE-He213)978-3-540-37621-7 035 $a(PPN)155236628 035 $a(EXLCZ)991000000000212617 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aSoftware Security - Theories and Systems $eSecond Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 /$fedited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (VIII, 348 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v3233 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-23635-X 320 $aIncludes bibliographical references at the end of each chapters and index. 327 $a1: Analysis of Protocols and Cryptography -- Verifying Confidentiality and Authentication in Kerberos 5 -- A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack -- Formal Analysis of the NetBill Electronic Commerce Protocol -- Inferences on Honesty in Compositional Logic for Protocol Analysis -- A Formal System for Analysis of Cryptographic Encryption and Their Security Properties -- 2: Verification of Security Properties -- Formal Specification and Verification of Resource Bound Security Using PVS -- Java Program Verification at Nijmegen: Developments and Perspective -- Decision Procedures for Several Properties of Reactive System Specifications -- A Model for Delimited Information Release -- 3: Safe Implementation of Programming Languages -- The Interface Definition Language for Fail-Safe C -- Lightweight Wrappers for Interfacing with Binary Code in CCured -- 4: Secure Execution Environments -- Detecting Unknown Computer Viruses ? A New Approach ? -- Security Policy Descriptions Through the Use of Control Structure of a Target Program -- Securing RPC with a Reference Monitor for System Calls -- UML Scrapbook and Realization of Snapshot Programming Environment -- 5: Secure Systems and Security Management -- Managing Information Technology Security Risk -- SEAS: A Secure E-Voting Applet System -- The Design of a Secure Distributed Devices System Based on Immunity. 330 $aFollowing the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4?6, 2003. This volume is the collection of the papers that were presented at ISSS 2003. The proceedings of ISSS 2002 was published as LNCS 2609. Although the security and reliability of software systems for networked c- puter systems are major concerns of current society, the technology for software securitystillneedstobedevelopedinmanydirections.SimilartoISSS2002,ISSS 2003 aimed to provide a forum for research discussions and exchanges among world-leading scientists in the ?elds of both theoretical and systems aspects of security in software construction. The program of ISSS 2003 was a combination of invited talks and selected research contributions. It included the most recent visions and researches of the 9invitedspeakers,aswellas11contributionsofresearchesfundedbytheMEXT grant-in-aid for scienti?c research on the priority area ?Implementation Scheme for Secure Computing? (AnZenKaken). We collected the original contributions after their presentation at the symposium and began a review procedure that resulted in the selection of the papers in this volume. They appear here in ?nal form. ISSS 2003 required a lot of work that was heavily dependent on members of the program committee, and sta?s and graduate students who participated in AnZenKaken. We sincerely thank them for their e?orts and time. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v3233 606 $aApplication software 606 $aComputer networks 606 $aOperating systems (Computers) 606 $aData encryption (Computer science) 606 $aProgramming languages (Electronic computers) 606 $aComputers 606 $aComputer Applications$3https://scigraph.springernature.com/ontologies/product-market-codes/I23001 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aProgramming Languages, Compilers, Interpreters$3https://scigraph.springernature.com/ontologies/product-market-codes/I14037 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 615 0$aApplication software. 615 0$aComputer networks. 615 0$aOperating systems (Computers) 615 0$aData encryption (Computer science) 615 0$aProgramming languages (Electronic computers) 615 0$aComputers. 615 14$aComputer Applications. 615 24$aComputer Communication Networks. 615 24$aOperating Systems. 615 24$aCryptology. 615 24$aProgramming Languages, Compilers, Interpreters. 615 24$aTheory of Computation. 676 $a005.8 702 $aFutatsugi$b Kokichi$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aMizoguchi$b Fumio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYonezaki$b Naoki$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aISSS 2002 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910144339803321 996 $aSoftware Security -- Theories and Systems$91980342 997 $aUNINA