Engineering Secure Software and Systems [[electronic resource] ] : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings / / edited by Jan Jürjens, Frank Piessens, Nataliia Bielova |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 231 p. 59 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-319-04897-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Model-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. |
Record Nr. | UNISA-996205178103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings / / edited by Jan Jürjens, Frank Piessens, Nataliia Bielova |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 231 p. 59 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-319-04897-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Model-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. |
Record Nr. | UNINA-9910483934903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering Secure Software and Systems [[electronic resource] ] : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings / / edited by Jan Jürjens, Ben Livshits, Riccardo Scandariato |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 231 p. 40 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-642-36563-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention -- Idea: Callee-Site Rewriting of Sealed System Libraries -- Towards Unified Authorization for Android -- Model-Based Usage Control Policy Derivation -- Compositional Verification of Application-Level Security Properties -- Towards Verifying Voter Privacy through Unlinkability -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification -- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer -- DKAL: Constructing Executable Specifications of Authorization Protocols -- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services -- Idea: Writing Secure C Programs with SecProve -- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts -- An Empirical Study on the Effectiveness of Security Code Review -- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. |
Record Nr. | UNISA-996466260403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings / / edited by Jan Jürjens, Ben Livshits, Riccardo Scandariato |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 231 p. 40 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer networks
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-642-36563-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention -- Idea: Callee-Site Rewriting of Sealed System Libraries -- Towards Unified Authorization for Android -- Model-Based Usage Control Policy Derivation -- Compositional Verification of Application-Level Security Properties -- Towards Verifying Voter Privacy through Unlinkability -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification -- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer -- DKAL: Constructing Executable Specifications of Authorization Protocols -- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services -- Idea: Writing Secure C Programs with SecProve -- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts -- An Empirical Study on the Effectiveness of Security Code Review -- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. |
Record Nr. | UNINA-9910739480603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|