top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Engineering secure software and systems : second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 ; proceedings / / Fabio Massacci, Dan Wallach, Nicola Zannone (eds.)
Engineering secure software and systems : second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 ; proceedings / / Fabio Massacci, Dan Wallach, Nicola Zannone (eds.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, c2010
Descrizione fisica 1 online resource (X, 241 p.)
Disciplina 005.8
Altri autori (Persone) MassacciFabio
WallachDan Seth <1971->
ZannoneNicola
Collana Lecture notes in computer science
Soggetto topico Computer security
Sensor networks
Software engineering
ISBN 1-280-38563-4
9786613563552
3-642-11747-3
Classificazione SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Session 1. Attack Analysis and Prevention I -- BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks -- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests -- Idea: Opcode-Sequence-Based Malware Detection -- Session 2. Attack Analysis and Prevention II -- Experiences with PDG-Based IFC -- Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications -- Idea: Towards Architecture-Centric Security Analysis of Software -- Session 3. Policy Verification and Enforcement I -- Formally-Based Black-Box Monitoring of Security Protocols -- Secure Code Generation for Web Applications -- Idea: Reusability of Threat Models – Two Approaches with an Experimental Evaluation -- Session 4. Policy Verification and Enforcement II -- Model-Driven Security Policy Deployment: Property Oriented Approach -- Category-Based Authorisation Models: Operational Semantics and Expressive Power -- Idea: Efficient Evaluation of Access Control Constraints -- Session 5. Secure System and Software Development I -- Formal Verification of Application-Specific Security Properties in a Model-Driven Approach -- Idea: Enforcing Consumer-Specified Security Properties for Modular Software -- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks -- Session 6. Secure System and Software Development II -- Automatic Generation of Smart, Security-Aware GUI Models -- Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems -- Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality.
Altri titoli varianti ESSoS 2010
Record Nr. UNINA-9910484892503321
Berlin, : Springer, c2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Engineering secure software and systems : First international symposium, ESSoS 2009, Leuven, Belgium, February 2009, proceedings / / Fabio Massacci, Samuel T. Redwine, Nicola Zannone (eds.)
Engineering secure software and systems : First international symposium, ESSoS 2009, Leuven, Belgium, February 2009, proceedings / / Fabio Massacci, Samuel T. Redwine, Nicola Zannone (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, : Springer, c2009
Descrizione fisica 1 online resource (X, 201 p.)
Disciplina 005.8
Altri autori (Persone) MassacciFabio
RedwineSamuel T
ZannoneNicola
Collana Lecture notes in computer science
Soggetto topico Computer security
Software engineering
Sensor networks
ISBN 3-642-00199-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Policy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software – Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results.
Record Nr. UNINA-9910484085803321
Berlin, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2nd ACM Workshop on Quality of Protection
Proceedings of the 2nd ACM Workshop on Quality of Protection
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2006
Descrizione fisica 1 online resource (64 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 2nd Association for Computing Machinery Workshop on Quality of Protection
Record Nr. UNINA-9910376495303321
[Place of publication not identified], : ACM, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui