Engineering secure software and systems : second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010 ; proceedings / / Fabio Massacci, Dan Wallach, Nicola Zannone (eds.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, : Springer, c2010 |
Descrizione fisica | 1 online resource (X, 241 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
MassacciFabio
WallachDan Seth <1971-> ZannoneNicola |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Sensor networks Software engineering |
ISBN |
1-280-38563-4
9786613563552 3-642-11747-3 |
Classificazione | SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Session 1. Attack Analysis and Prevention I -- BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks -- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests -- Idea: Opcode-Sequence-Based Malware Detection -- Session 2. Attack Analysis and Prevention II -- Experiences with PDG-Based IFC -- Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications -- Idea: Towards Architecture-Centric Security Analysis of Software -- Session 3. Policy Verification and Enforcement I -- Formally-Based Black-Box Monitoring of Security Protocols -- Secure Code Generation for Web Applications -- Idea: Reusability of Threat Models – Two Approaches with an Experimental Evaluation -- Session 4. Policy Verification and Enforcement II -- Model-Driven Security Policy Deployment: Property Oriented Approach -- Category-Based Authorisation Models: Operational Semantics and Expressive Power -- Idea: Efficient Evaluation of Access Control Constraints -- Session 5. Secure System and Software Development I -- Formal Verification of Application-Specific Security Properties in a Model-Driven Approach -- Idea: Enforcing Consumer-Specified Security Properties for Modular Software -- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks -- Session 6. Secure System and Software Development II -- Automatic Generation of Smart, Security-Aware GUI Models -- Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems -- Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality. |
Altri titoli varianti | ESSoS 2010 |
Record Nr. | UNINA-9910484892503321 |
Berlin, : Springer, c2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering secure software and systems : First international symposium, ESSoS 2009, Leuven, Belgium, February 2009, proceedings / / Fabio Massacci, Samuel T. Redwine, Nicola Zannone (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, : Springer, c2009 |
Descrizione fisica | 1 online resource (X, 201 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
MassacciFabio
RedwineSamuel T ZannoneNicola |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Software engineering Sensor networks |
ISBN | 3-642-00199-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Policy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software – Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results. |
Record Nr. | UNINA-9910484085803321 |
Berlin, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2nd ACM Workshop on Quality of Protection |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2006 |
Descrizione fisica | 1 online resource (64 pages) |
Collana | ACM Conferences |
Soggetto topico |
Engineering & Applied Sciences
Computer Science |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Proceedings of the 2nd Association for Computing Machinery Workshop on Quality of Protection |
Record Nr. | UNINA-9910376495303321 |
[Place of publication not identified], : ACM, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|