Software Security - Theories and Systems [[electronic resource] ] : Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 / / edited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (VIII, 348 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Application software
Computer communication systems Operating systems (Computers) Data encryption (Computer science) Programming languages (Electronic computers) Computers Computer Applications Computer Communication Networks Operating Systems Cryptology Programming Languages, Compilers, Interpreters Theory of Computation |
ISBN | 3-540-37621-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1: Analysis of Protocols and Cryptography -- Verifying Confidentiality and Authentication in Kerberos 5 -- A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack -- Formal Analysis of the NetBill Electronic Commerce Protocol -- Inferences on Honesty in Compositional Logic for Protocol Analysis -- A Formal System for Analysis of Cryptographic Encryption and Their Security Properties -- 2: Verification of Security Properties -- Formal Specification and Verification of Resource Bound Security Using PVS -- Java Program Verification at Nijmegen: Developments and Perspective -- Decision Procedures for Several Properties of Reactive System Specifications -- A Model for Delimited Information Release -- 3: Safe Implementation of Programming Languages -- The Interface Definition Language for Fail-Safe C -- Lightweight Wrappers for Interfacing with Binary Code in CCured -- 4: Secure Execution Environments -- Detecting Unknown Computer Viruses – A New Approach – -- Security Policy Descriptions Through the Use of Control Structure of a Target Program -- Securing RPC with a Reference Monitor for System Calls -- UML Scrapbook and Realization of Snapshot Programming Environment -- 5: Secure Systems and Security Management -- Managing Information Technology Security Risk -- SEAS: A Secure E-Voting Applet System -- The Design of a Secure Distributed Devices System Based on Immunity. |
Record Nr. | UNISA-996465755003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Software Security - Theories and Systems : Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 / / edited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki |
Edizione | [1st ed. 2004.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 |
Descrizione fisica | 1 online resource (VIII, 348 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Application software
Computer networks Operating systems (Computers) Data encryption (Computer science) Programming languages (Electronic computers) Computers Computer Applications Computer Communication Networks Operating Systems Cryptology Programming Languages, Compilers, Interpreters Theory of Computation |
ISBN | 3-540-37621-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | 1: Analysis of Protocols and Cryptography -- Verifying Confidentiality and Authentication in Kerberos 5 -- A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack -- Formal Analysis of the NetBill Electronic Commerce Protocol -- Inferences on Honesty in Compositional Logic for Protocol Analysis -- A Formal System for Analysis of Cryptographic Encryption and Their Security Properties -- 2: Verification of Security Properties -- Formal Specification and Verification of Resource Bound Security Using PVS -- Java Program Verification at Nijmegen: Developments and Perspective -- Decision Procedures for Several Properties of Reactive System Specifications -- A Model for Delimited Information Release -- 3: Safe Implementation of Programming Languages -- The Interface Definition Language for Fail-Safe C -- Lightweight Wrappers for Interfacing with Binary Code in CCured -- 4: Secure Execution Environments -- Detecting Unknown Computer Viruses – A New Approach – -- Security Policy Descriptions Through the Use of Control Structure of a Target Program -- Securing RPC with a Reference Monitor for System Calls -- UML Scrapbook and Realization of Snapshot Programming Environment -- 5: Secure Systems and Security Management -- Managing Information Technology Security Risk -- SEAS: A Secure E-Voting Applet System -- The Design of a Secure Distributed Devices System Based on Immunity. |
Record Nr. | UNINA-9910144339803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|