LEADER 05286nam 22008175 450 001 996466004503316 005 20200706005333.0 010 $a3-642-00199-8 024 7 $a10.1007/978-3-642-00199-4 035 $a(CKB)1000000000718115 035 $a(SSID)ssj0000317484 035 $a(PQKBManifestationID)11211761 035 $a(PQKBTitleCode)TC0000317484 035 $a(PQKBWorkID)10293465 035 $a(PQKB)10496337 035 $a(DE-He213)978-3-642-00199-4 035 $a(MiAaPQ)EBC3064090 035 $a(PPN)134126262 035 $a(EXLCZ)991000000000718115 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aEngineering Secure Software and Systems$b[electronic resource] $eFirst International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings /$fedited by Fabio MASSACCI, Samuel Redwine, Nicola Zannone 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 201 p.) 225 1 $aSecurity and Cryptology ;$v5429 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-00198-X 320 $aIncludes bibliographical references and index. 327 $aPolicy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software ? Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results. 330 $aThis book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in Leuven, Belgium, in February 2009. The 10 revised full papers presented together with 7 industry reports and ideas papers were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance. 410 0$aSecurity and Cryptology ;$v5429 606 $aComputer security 606 $aSoftware engineering 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aData encryption (Computer science) 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aSoftware Engineering$3https://scigraph.springernature.com/ontologies/product-market-codes/I14029 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 615 0$aComputer security. 615 0$aSoftware engineering. 615 0$aOperating systems (Computers). 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aData encryption (Computer science). 615 14$aSystems and Data Security. 615 24$aSoftware Engineering. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aCryptology. 676 $a005.8 702 $aMASSACCI$b Fabio$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aRedwine$b Samuel$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aZannone$b Nicola$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aESSoS (Symposium) 906 $aBOOK 912 $a996466004503316 996 $aEngineering Secure Software and Systems$9774151 997 $aUNISA