LEADER 00747nam0-22002531i-450- 001 990001223230403321 035 $a000122323 035 $aFED01000122323 035 $a(Aleph)000122323FED01 035 $a000122323 100 $a20000920d--------km-y0itay50------ba 101 0 $aeng 200 1 $aUniform Algebras and Jensen Measures$fby Gamelin T.W. 210 $aCambridge [etc.]$cCambridge University Press 225 1 $aLondon Mathematical Society lecture note series 700 1$aGamelin,$bTheodore W.$056842 801 0$aIT$bUNINA$gRICA$2UNIMARC 901 $aBK 912 $a990001223230403321 952 $aC-9-(32$b20401$fMA1 959 $aMA1 996 $aUniform Algebras and Jensen Measures$9343249 997 $aUNINA DB $aING01 LEADER 05239nam 22009255 450 001 9910484892503321 005 20251226203108.0 010 $a1-280-38563-4 010 $a9786613563552 010 $a3-642-11747-3 024 7 $a10.1007/978-3-642-11747-3 035 $a(CKB)2670000000003386 035 $a(SSID)ssj0000355494 035 $a(PQKBManifestationID)11261334 035 $a(PQKBTitleCode)TC0000355494 035 $a(PQKBWorkID)10319764 035 $a(PQKB)10805868 035 $a(DE-He213)978-3-642-11747-3 035 $a(MiAaPQ)EBC3065025 035 $a(PPN)149057113 035 $a(Association for Computing Machinery)10.5555/2175005 035 $a(EXLCZ)992670000000003386 100 $a20100301d2010 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aEngineering Secure Software and Systems $eSecond International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings /$fedited by Fabio MASSACCI, Dan Wallach, Nicola Zannone 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (X, 241 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5965 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-11746-5 320 $aIncludes bibliographical references and index. 327 $aSession 1. Attack Analysis and Prevention I -- BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks -- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests -- Idea: Opcode-Sequence-Based Malware Detection -- Session 2. Attack Analysis and Prevention II -- Experiences with PDG-Based IFC -- Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications -- Idea: Towards Architecture-Centric Security Analysis of Software -- Session 3. Policy Verification and Enforcement I -- Formally-Based Black-Box Monitoring of Security Protocols -- Secure Code Generation for Web Applications -- Idea: Reusability of Threat Models ? Two Approaches with an Experimental Evaluation -- Session 4. Policy Verification and Enforcement II -- Model-Driven Security Policy Deployment: Property Oriented Approach -- Category-Based Authorisation Models: Operational Semantics and Expressive Power -- Idea: Efficient Evaluation of Access Control Constraints -- Session 5. Secure System and Software Development I -- Formal Verification of Application-Specific Security Properties in a Model-Driven Approach -- Idea: Enforcing Consumer-Specified Security Properties for Modular Software -- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks -- Session 6. Secure System and Software Development II -- Automatic Generation of Smart, Security-Aware GUI Models -- Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems -- Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. 330 $aThis book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5965 606 $aComputer networks 606 $aSoftware engineering 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData structures (Computer science) 606 $aInformation theory 606 $aComputer science$xMathematics 606 $aComputer science 606 $aComputer Communication Networks 606 $aSoftware Engineering 606 $aCryptology 606 $aData Structures and Information Theory 606 $aMathematical Applications in Computer Science 606 $aModels of Computation 615 0$aComputer networks. 615 0$aSoftware engineering. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aComputer science$xMathematics. 615 0$aComputer science. 615 14$aComputer Communication Networks. 615 24$aSoftware Engineering. 615 24$aCryptology. 615 24$aData Structures and Information Theory. 615 24$aMathematical Applications in Computer Science. 615 24$aModels of Computation. 676 $a005.8 686 $aSS 4800$2rvk 701 $aMassacci$b Fabio$01757823 701 $aWallach$b Dan Seth$f1971-$01757824 701 $aZannone$b Nicola$01757825 712 12$aESSoS (Symposium) 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484892503321 996 $aEngineering secure software and systems$94195789 997 $aUNINA