Engineering Secure Software and Systems [[electronic resource] ] : 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings / / edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 227 p. 63 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Algorithms Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Algorithm Analysis and Problem Complexity Math Applications in Computer Science Models and Principles |
ISBN | 3-319-15618-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal methods -- Cloud passwords -- Machine learning -- Measurements ontologies -- Access control. |
Record Nr. | UNISA-996198743803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings / / edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 227 p. 63 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Algorithms Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Algorithm Analysis and Problem Complexity Math Applications in Computer Science Models and Principles |
ISBN | 3-319-15618-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal methods -- Cloud passwords -- Machine learning -- Measurements ontologies -- Access control. |
Record Nr. | UNINA-9910484540603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering Secure Software and Systems [[electronic resource] ] : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings / / edited by Jan Jürjens, Frank Piessens, Nataliia Bielova |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 231 p. 59 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-319-04897-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Model-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. |
Record Nr. | UNISA-996205178103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings / / edited by Jan Jürjens, Frank Piessens, Nataliia Bielova |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 231 p. 59 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-319-04897-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Model-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. |
Record Nr. | UNINA-9910483934903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|