top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Engineering Secure Software and Systems : Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings / / edited by Fabio MASSACCI, Dan Wallach, Nicola Zannone
Engineering Secure Software and Systems : Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings / / edited by Fabio MASSACCI, Dan Wallach, Nicola Zannone
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (X, 241 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer communication systems
Software engineering
Data encryption (Computer science)
Data structures (Computer science)
Computer science—Mathematics
Computers
Computer Communication Networks
Software Engineering/Programming and Operating Systems
Cryptology
Data Structures and Information Theory
Math Applications in Computer Science
Models and Principles
Soggetto genere / forma Kongress.
Pisa (2010)
ISBN 1-280-38563-4
9786613563552
3-642-11747-3
Classificazione SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1. Attack Analysis and Prevention I -- BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks -- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests -- Idea: Opcode-Sequence-Based Malware Detection -- Session 2. Attack Analysis and Prevention II -- Experiences with PDG-Based IFC -- Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications -- Idea: Towards Architecture-Centric Security Analysis of Software -- Session 3. Policy Verification and Enforcement I -- Formally-Based Black-Box Monitoring of Security Protocols -- Secure Code Generation for Web Applications -- Idea: Reusability of Threat Models – Two Approaches with an Experimental Evaluation -- Session 4. Policy Verification and Enforcement II -- Model-Driven Security Policy Deployment: Property Oriented Approach -- Category-Based Authorisation Models: Operational Semantics and Expressive Power -- Idea: Efficient Evaluation of Access Control Constraints -- Session 5. Secure System and Software Development I -- Formal Verification of Application-Specific Security Properties in a Model-Driven Approach -- Idea: Enforcing Consumer-Specified Security Properties for Modular Software -- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks -- Session 6. Secure System and Software Development II -- Automatic Generation of Smart, Security-Aware GUI Models -- Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems -- Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality.
Altri titoli varianti ESSoS'10
Record Nr. UNISA-996465522803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Engineering Secure Software and Systems [[electronic resource] ] : First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings / / edited by Fabio MASSACCI, Samuel Redwine, Nicola Zannone
Engineering Secure Software and Systems [[electronic resource] ] : First International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings / / edited by Fabio MASSACCI, Samuel Redwine, Nicola Zannone
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (X, 201 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Software engineering
Operating systems (Computers)
Algorithms
Management information systems
Computer science
Data encryption (Computer science)
Systems and Data Security
Software Engineering
Operating Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Cryptology
ISBN 3-642-00199-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Policy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software – Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results.
Record Nr. UNISA-996466004503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Safety and Security in Multiagent Systems [[electronic resource] ] : Research Results from 2004-2006 / / edited by Mike Barley, Haris Mouratidis, Amy Unruh, Diana F. Gordon-Spears, Paul Scerri, Fabio MASSACCI
Safety and Security in Multiagent Systems [[electronic resource] ] : Research Results from 2004-2006 / / edited by Mike Barley, Haris Mouratidis, Amy Unruh, Diana F. Gordon-Spears, Paul Scerri, Fabio MASSACCI
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (VIII, 343 p.)
Disciplina 006.3
Collana Lecture Notes in Artificial Intelligence
Soggetto topico Artificial intelligence
User interfaces (Computer systems)
Human-computer interaction
Data protection
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Computer networks
Artificial Intelligence
User Interfaces and Human Computer Interaction
Data and Information Security
Cryptology
IT Operations
Computer Communication Networks
ISBN 3-642-04879-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Methodological Approaches to High-Assurance Systems -- Towards Safe Coordination in Multi-agent Systems -- Enhancing Secure Tropos to Effectively Deal with Security Requirements in the Development of Multiagent Systems -- Dependable Multi-agent Systems: Layered Reference Architecture and Representative Mechanisms -- Towards Using Simulation to Evaluate Safety Policy for Systems of Systems -- A Guardian Agent Approach to Safety in Medical Multi-agent Systems -- A Distributed Numerical Approach for Managing Uncertainty in Large-Scale Multi-agent Systems -- Prevention and Response to Harm/Failures -- The First Law of Robotics -- Safe Stochastic Planning: Planning to Avoid Fatal States -- Building Coordinated Real-Time Control Plans -- A Framework for Goal-Based Semantic Compensation in Agent Systems -- Safe Agents in Space: Preventing and Responding to Anomalies in the Autonomous Sciencecraft Experiment -- Stochastic Approaches to Predictability and Unpredictability -- Uncertain Agent Verification through Probabilistic Model-Checking -- Safety and Security Multi-agent Systems -- Coordinating Randomized Policies for Increasing Security in Multiagent Systems -- Safety and Security in Human-Computer Interactions -- Safety in the Context of Coordination via Adjustable Autonomy -- Command and Authorization Services for Multiple Humans Interacting with a Software Control Agent for Advanced Life Support -- Analyzing Dangers in Multiagent Rescue Using DEFACTO -- Using Multi-agent Systems to Specify Safe and Secure Services for Virtual Organisations -- MLBPR: MAS for Large-Scale Biometric Pattern Recognition -- Self-Protection -- Intentional Agents in Defense -- Security and Privacy Issues in Agent-Based Location-Aware Mobile Commerce -- Biologically-Inspired Concepts for Autonomic Self-protection in Multiagent Systems -- Erratum to: Fluid-Like Swarms with Predictable Macroscopic Behavior.
Record Nr. UNISA-996465298703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Trust Management [[electronic resource] ] : 4th International Conference, iTrust 2006, Pisa, Italy, May 16-19, 2006, Proceedings / / edited by Ketil Stølen, William H. Winsborough, Fabio Martinelli, Fabio MASSACCI
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 476 p.)
Disciplina 005.1
Collana Information Systems and Applications, incl. Internet/Web, and HCI
Soggetto topico Software engineering
Application software
Information storage and retrieval
Computer communication systems
Computers and civilization
Management information systems
Computer science
Software Engineering/Programming and Operating Systems
Information Systems Applications (incl. Internet)
Information Storage and Retrieval
Computer Communication Networks
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-34297-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Why We Need a Non-reductionist Approach to Trust -- Full Papers -- Dynamic Trust Federation in Grids -- Being Trusted in a Social Network: Trust as Relational Capital -- A Requirements-Driven Trust Framework for Secure Interoperation in Open Environments -- Normative Structures in Trust Management -- Gathering Experience in Trust-Based Interactions -- Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail -- Generating Predictive Movie Recommendations from Trust in Social Networks -- Temporal Logic-Based Specification and Verification of Trust Models -- Modelling Trade and Trust Across Cultures -- Estimating the Relative Trustworthiness of Information Sources in Security Solution Evaluation -- Trust-Based Route Selection in Dynamic Source Routing -- Implementing Credential Networks -- Exploring Different Types of Trust Propagation -- PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation -- A Versatile Approach to Combining Trust Values for Making Binary Decisions -- Jiminy: A Scalable Incentive-Based Architecture for Improving Rating Quality -- Virtual Fingerprinting as a Foundation for Reputation in Open Systems -- Towards Automated Evaluation of Trust Constraints -- Provision of Trusted Identity Management Using Trust Credentials -- Acceptance of Voting Technology: Between Confidence and Trust -- B-Trust: Bayesian Trust Framework for Pervasive Computing -- TATA: Towards Anonymous Trusted Authentication -- The Design, Generation, and Utilisation of a Semantically Rich Personalised Model of Trust -- A Trust Assignment Model Based on Alternate Actions Payoff -- Privacy, Reputation, and Trust: Some Implications for Data Protection -- A Reputation-Based System for Confidentiality Modeling in Peer-to-Peer Networks -- Robust Reputations for Peer-to-Peer Marketplaces -- From Theory to Practice: Forgiveness as a Mechanism to Repair Conflicts in CMC -- A Novel Protocol for Communicating Reputation in P2P Networks -- A Scalable Probabilistic Approach to Trust Evaluation -- Demonstration Overviews -- The Agent Reputation and Trust (ART) Testbed -- Trust Establishment in Emergency Case -- Evaluating Trust and Authenticity with Caution -- Using Jiminy for Run-Time User Classification Based on Rating Behaviour -- Traust: A Trust Negotiation Based Authorization Service -- The Interactive Cooperation Tournament -- eTVRA, a Threat, Vulnerability and Risk Assessment Tool for eEurope.
Record Nr. UNISA-996466164903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui