Engineering Secure Software and Systems [[electronic resource] ] : 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings / / edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 227 p. 63 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Algorithms Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Algorithm Analysis and Problem Complexity Math Applications in Computer Science Models and Principles |
ISBN | 3-319-15618-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal methods -- Cloud passwords -- Machine learning -- Measurements ontologies -- Access control. |
Record Nr. | UNISA-996198743803316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015, Proceedings / / edited by Frank Piessens, Juan Caballero, Nataliia Bielova |
Edizione | [1st ed. 2015.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 |
Descrizione fisica | 1 online resource (XII, 227 p. 63 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Algorithms Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Algorithm Analysis and Problem Complexity Math Applications in Computer Science Models and Principles |
ISBN | 3-319-15618-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Formal methods -- Cloud passwords -- Machine learning -- Measurements ontologies -- Access control. |
Record Nr. | UNINA-9910484540603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering Secure Software and Systems [[electronic resource] ] : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings / / edited by Jan Jürjens, Frank Piessens, Nataliia Bielova |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 231 p. 59 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-319-04897-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Model-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. |
Record Nr. | UNISA-996205178103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings / / edited by Jan Jürjens, Frank Piessens, Nataliia Bielova |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 231 p. 59 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Seguridad informática
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-319-04897-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Model-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. |
Record Nr. | UNINA-9910483934903321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Primer on Client-Side Web Security / / by Philippe De Ryck, Lieven Desmet, Frank Piessens, Martin Johns |
Autore | De Ryck Philippe |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (119 p.) |
Disciplina | 005.8 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Computer security
Electrical engineering Application software Systems and Data Security Communications Engineering, Networks Information Systems Applications (incl. Internet) |
ISBN | 3-319-12226-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | The Relevance of Client-side Web Security -- Traditional Building Blocks of the Web -- The Browser as a Platform -- How Attackers Threaten the Web -- Attacks on the Network -- Attacks on the Browser's Requests -- Attacks on the User's Session -- Attacks on the Client-Side Context -- Attacks on the Client Device -- Improving Client-side Web Security. |
Record Nr. | UNINA-9910298982303321 |
De Ryck Philippe | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Principles of Security and Trust [[electronic resource] ] : 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings / / edited by Frank Piessens, Luca Viganò |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 277 p. 69 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Management information systems Computer science Computers and civilization Algorithms Systems and Data Security Computer Communication Networks Cryptology Management of Computing and Information Systems Computers and Society Algorithm Analysis and Problem Complexity |
ISBN | 3-662-49635-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow -- Faceted Dynamic Information Flow via Control and Data Monads -- Asymmetric Secure Multi-execution with Declassification -- A Taxonomy of Information Flow Monitors -- On Improvements of Low-Deterministic Security -- Tool Demonstration: JOANA -- Models and Applications -- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study -- Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels -- Correct Audit Logging: Theory and Practice -- The Value of Attack-Defence Diagrams -- Protocols -- Composing protocols with randomized actions -- Bounding the number of agents, for equivalence too -- AIF-omega: Set-Based Protocol Abstraction with Countable Families -- Computational Soundness Results for Stateful Applied pi Calculus. . |
Record Nr. | UNISA-996465723103316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Principles of Security and Trust : 5th International Conference, POST 2016, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2016, Eindhoven, The Netherlands, April 2-8, 2016, Proceedings / / edited by Frank Piessens, Luca Viganò |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 277 p. 69 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Data encryption (Computer science) Management information systems Computer science Computers and civilization Algorithms Systems and Data Security Computer Communication Networks Cryptology Management of Computing and Information Systems Computers and Society Algorithm Analysis and Problem Complexity |
ISBN | 3-662-49635-6 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Information Flow -- Faceted Dynamic Information Flow via Control and Data Monads -- Asymmetric Secure Multi-execution with Declassification -- A Taxonomy of Information Flow Monitors -- On Improvements of Low-Deterministic Security -- Tool Demonstration: JOANA -- Models and Applications -- Towards Fully Automatic Logic-Based Information Flow Analysis: An Electronic-Voting Case Study -- Towards a Comprehensive Model of Isolation for Mitigating Illicit Channels -- Correct Audit Logging: Theory and Practice -- The Value of Attack-Defence Diagrams -- Protocols -- Composing protocols with randomized actions -- Bounding the number of agents, for equivalence too -- AIF-omega: Set-Based Protocol Abstraction with Countable Families -- Computational Soundness Results for Stateful Applied pi Calculus. . |
Record Nr. | UNINA-9910483756403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|