top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Software Security - Theories and Systems [[electronic resource] ] : Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 / / edited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki
Software Security - Theories and Systems [[electronic resource] ] : Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 / / edited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (VIII, 348 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Application software
Computer communication systems
Operating systems (Computers)
Data encryption (Computer science)
Programming languages (Electronic computers)
Computers
Computer Applications
Computer Communication Networks
Operating Systems
Cryptology
Programming Languages, Compilers, Interpreters
Theory of Computation
ISBN 3-540-37621-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1: Analysis of Protocols and Cryptography -- Verifying Confidentiality and Authentication in Kerberos 5 -- A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack -- Formal Analysis of the NetBill Electronic Commerce Protocol -- Inferences on Honesty in Compositional Logic for Protocol Analysis -- A Formal System for Analysis of Cryptographic Encryption and Their Security Properties -- 2: Verification of Security Properties -- Formal Specification and Verification of Resource Bound Security Using PVS -- Java Program Verification at Nijmegen: Developments and Perspective -- Decision Procedures for Several Properties of Reactive System Specifications -- A Model for Delimited Information Release -- 3: Safe Implementation of Programming Languages -- The Interface Definition Language for Fail-Safe C -- Lightweight Wrappers for Interfacing with Binary Code in CCured -- 4: Secure Execution Environments -- Detecting Unknown Computer Viruses – A New Approach – -- Security Policy Descriptions Through the Use of Control Structure of a Target Program -- Securing RPC with a Reference Monitor for System Calls -- UML Scrapbook and Realization of Snapshot Programming Environment -- 5: Secure Systems and Security Management -- Managing Information Technology Security Risk -- SEAS: A Secure E-Voting Applet System -- The Design of a Secure Distributed Devices System Based on Immunity.
Record Nr. UNISA-996465755003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Software Security - Theories and Systems : Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 / / edited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki
Software Security - Theories and Systems : Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 / / edited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (VIII, 348 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Application software
Computer networks
Operating systems (Computers)
Data encryption (Computer science)
Programming languages (Electronic computers)
Computers
Computer Applications
Computer Communication Networks
Operating Systems
Cryptology
Programming Languages, Compilers, Interpreters
Theory of Computation
ISBN 3-540-37621-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto 1: Analysis of Protocols and Cryptography -- Verifying Confidentiality and Authentication in Kerberos 5 -- A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack -- Formal Analysis of the NetBill Electronic Commerce Protocol -- Inferences on Honesty in Compositional Logic for Protocol Analysis -- A Formal System for Analysis of Cryptographic Encryption and Their Security Properties -- 2: Verification of Security Properties -- Formal Specification and Verification of Resource Bound Security Using PVS -- Java Program Verification at Nijmegen: Developments and Perspective -- Decision Procedures for Several Properties of Reactive System Specifications -- A Model for Delimited Information Release -- 3: Safe Implementation of Programming Languages -- The Interface Definition Language for Fail-Safe C -- Lightweight Wrappers for Interfacing with Binary Code in CCured -- 4: Secure Execution Environments -- Detecting Unknown Computer Viruses – A New Approach – -- Security Policy Descriptions Through the Use of Control Structure of a Target Program -- Securing RPC with a Reference Monitor for System Calls -- UML Scrapbook and Realization of Snapshot Programming Environment -- 5: Secure Systems and Security Management -- Managing Information Technology Security Risk -- SEAS: A Secure E-Voting Applet System -- The Design of a Secure Distributed Devices System Based on Immunity.
Record Nr. UNINA-9910144339803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui