Engineering Secure Software and Systems : Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings / / edited by Fabio MASSACCI, Dan Wallach, Nicola Zannone |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (X, 241 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Software engineering Data encryption (Computer science) Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Software Engineering/Programming and Operating Systems Cryptology Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
Soggetto genere / forma |
Kongress.
Pisa (2010) |
ISBN |
1-280-38563-4
9786613563552 3-642-11747-3 |
Classificazione | SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1. Attack Analysis and Prevention I -- BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks -- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests -- Idea: Opcode-Sequence-Based Malware Detection -- Session 2. Attack Analysis and Prevention II -- Experiences with PDG-Based IFC -- Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications -- Idea: Towards Architecture-Centric Security Analysis of Software -- Session 3. Policy Verification and Enforcement I -- Formally-Based Black-Box Monitoring of Security Protocols -- Secure Code Generation for Web Applications -- Idea: Reusability of Threat Models – Two Approaches with an Experimental Evaluation -- Session 4. Policy Verification and Enforcement II -- Model-Driven Security Policy Deployment: Property Oriented Approach -- Category-Based Authorisation Models: Operational Semantics and Expressive Power -- Idea: Efficient Evaluation of Access Control Constraints -- Session 5. Secure System and Software Development I -- Formal Verification of Application-Specific Security Properties in a Model-Driven Approach -- Idea: Enforcing Consumer-Specified Security Properties for Modular Software -- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks -- Session 6. Secure System and Software Development II -- Automatic Generation of Smart, Security-Aware GUI Models -- Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems -- Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. |
Altri titoli varianti | ESSoS'10 |
Record Nr. | UNISA-996465522803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems [[electronic resource] ] : First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings / / edited by Fabio MASSACCI, Samuel Redwine, Nicola Zannone |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (X, 201 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Software engineering Operating systems (Computers) Algorithms Management information systems Computer science Data encryption (Computer science) Systems and Data Security Software Engineering Operating Systems Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Cryptology |
ISBN | 3-642-00199-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Policy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software – Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results. |
Record Nr. | UNISA-996466004503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Safety and Security in Multiagent Systems [[electronic resource] ] : Research Results from 2004-2006 / / edited by Mike Barley, Haris Mouratidis, Amy Unruh, Diana F. Gordon-Spears, Paul Scerri, Fabio MASSACCI |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (VIII, 343 p.) |
Disciplina | 006.3 |
Collana | Lecture Notes in Artificial Intelligence |
Soggetto topico |
Artificial intelligence
User interfaces (Computer systems) Human-computer interaction Data protection Cryptography Data encryption (Computer science) Electronic data processing—Management Computer networks Artificial Intelligence User Interfaces and Human Computer Interaction Data and Information Security Cryptology IT Operations Computer Communication Networks |
ISBN | 3-642-04879-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Methodological Approaches to High-Assurance Systems -- Towards Safe Coordination in Multi-agent Systems -- Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems -- Dependable Multi-agent Systems: Layered Reference Architecture and Representative Mechanisms -- Towards Using Simulation to Evaluate Safety Policy for Systems of Systems -- A Guardian Agent Approach to Safety in Medical Multi-agent Systems -- A Distributed Numerical Approach for Managing Uncertainty in Large-Scale Multi-agent Systems -- Prevention and Response to Harm/Failures -- The First Law of Robotics -- Safe Stochastic Planning: Planning to Avoid Fatal States -- Building Coordinated Real-Time Control Plans -- A Framework for Goal-Based Semantic Compensation in Agent Systems -- Safe Agents in Space: Preventing and Responding to Anomalies in the Autonomous Sciencecraft Experiment -- Stochastic Approaches to Predictability and Unpredictability -- Uncertain Agent Verification through Probabilistic Model-Checking -- Safety and Security Multi-agent Systems -- Coordinating Randomized Policies for Increasing Security in Multiagent Systems -- Safety and Security in Human-Computer Interactions -- Safety in the Context of Coordination via Adjustable Autonomy -- Command and Authorization Services for Multiple Humans Interacting with a Software Control Agent for Advanced Life Support -- Analyzing Dangers in Multiagent Rescue Using DEFACTO -- Using Multi-agent Systems to Specify Safe and Secure Services for Virtual Organisations -- MLBPR: MAS for Large-Scale Biometric Pattern Recognition -- Self-Protection -- Intentional Agents in Defense -- Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce -- Biologically-Inspired Concepts for Autonomic Self-protection in Multiagent Systems -- Erratum to: Fluid-Like Swarms with Predictable Macroscopic Behavior. |
Record Nr. | UNISA-996465298703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 476 p.) |
Disciplina | 005.1 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Software engineering
Application software Information storage and retrieval Computer communication systems Computers and civilization Management information systems Computer science Software Engineering/Programming and Operating Systems Information Systems Applications (incl. Internet) Information Storage and Retrieval Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-34297-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Why We Need a Non-reductionist Approach to Trust -- Full Papers -- Dynamic Trust Federation in Grids -- Being Trusted in a Social Network: Trust as Relational Capital -- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust Management -- Gathering Experience in Trust-Based Interactions -- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail -- Generating Predictive Movie Recommendations from Trust in Social Networks -- Temporal Logic-Based Specification and Verification of Trust Models -- Modelling Trade and Trust Across Cultures -- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation -- Trust-Based Route Selection in Dynamic Source Routing -- Implementing Credential Networks -- Exploring Different Types of Trust Propagation -- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation -- A Versatile Approach to Combining Trust Values for Making Binary Decisions -- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality -- Virtual Fingerprinting as a Foundation for Reputation in Open Systems -- Towards Automated Evaluation of Trust Constraints -- Provision of Trusted Identity Management Using Trust Credentials -- Acceptance of Voting Technology: Between Confidence and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted Authentication -- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust -- A Trust Assignment Model Based on Alternate Actions Payoff -- Privacy, Reputation, and Trust: Some Implications for Data Protection -- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks -- Robust Reputations for Peer-to-Peer Marketplaces -- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC -- A Novel Protocol for Communicating Reputation in P2P Networks -- A Scalable Probabilistic Approach to Trust Evaluation -- Demonstration Overviews -- The Agent Reputation and Trust (ART) Testbed -- Trust Establishment in Emergency Case -- Evaluating Trust and Authenticity with Caution -- Using Jiminy for Run-Time User Classification Based on Rating Behaviour -- Traust: A Trust Negotiation Based Authorization Service -- The Interactive Cooperation Tournament -- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope. |
Record Nr. | UNISA-996466164903316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|