6th International Workshop on Security Measurements and Metrics : MetriSec 2010 : Bolzano, Italy, September 15, 2010 |
Autore | Scandariato Riccardo |
Pubbl/distr/stampa | [Place of publication not identified], : ACM, 2010 |
Descrizione fisica | 1 online resource (78 pages) |
Collana | ACM International Conference Proceedings Series |
Soggetto topico |
Electrical & Computer Engineering
Engineering & Applied Sciences Telecommunications |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti |
Proceedings of the 6th International Workshop on Security Measurements and Metrics
ESEM '10 2010 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement, Bolzano, Italy - September 16 - 17, 2010 |
Record Nr. | UNINA-9910376010603321 |
Scandariato Riccardo
![]() |
||
[Place of publication not identified], : ACM, 2010 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering Secure Software and Systems [[electronic resource] ] : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings / / edited by Jan Jürjens, Ben Livshits, Riccardo Scandariato |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 231 p. 40 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-642-36563-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention -- Idea: Callee-Site Rewriting of Sealed System Libraries -- Towards Unified Authorization for Android -- Model-Based Usage Control Policy Derivation -- Compositional Verification of Application-Level Security Properties -- Towards Verifying Voter Privacy through Unlinkability -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification -- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer -- DKAL: Constructing Executable Specifications of Authorization Protocols -- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services -- Idea: Writing Secure C Programs with SecProve -- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts -- An Empirical Study on the Effectiveness of Security Code Review -- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. |
Record Nr. | UNISA-996466260403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems [[electronic resource] ] : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings / / edited by Jan Jürjens, Ben Livshits, Riccardo Scandariato |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XII, 231 p. 40 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-642-36563-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention -- Idea: Callee-Site Rewriting of Sealed System Libraries -- Towards Unified Authorization for Android -- Model-Based Usage Control Policy Derivation -- Compositional Verification of Application-Level Security Properties -- Towards Verifying Voter Privacy through Unlinkability -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification -- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer -- DKAL: Constructing Executable Specifications of Authorization Protocols -- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services -- Idea: Writing Secure C Programs with SecProve -- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts -- An Empirical Study on the Effectiveness of Security Code Review -- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. |
Record Nr. | UNINA-9910739480603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Engineering Secure Software and Systems : 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012, Proceedings / / edited by Gilles Barthe, Ben Livshits, Riccardo Scandariato |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XII, 151 p. 37 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-642-28166-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | ESSoS'12 |
Record Nr. | UNISA-996466172303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Engineering Secure Software and Systems : 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012, Proceedings / / edited by Gilles Barthe, Ben Livshits, Riccardo Scandariato |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XII, 151 p. 37 illus.) |
Disciplina | 004.6 |
Collana | Security and Cryptology |
Soggetto topico |
Computer communication systems
Data encryption (Computer science) Software engineering Data structures (Computer science) Computer science—Mathematics Computers Computer Communication Networks Cryptology Software Engineering/Programming and Operating Systems Data Structures and Information Theory Math Applications in Computer Science Models and Principles |
ISBN | 3-642-28166-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | ESSoS'12 |
Record Nr. | UNINA-9910510602803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 13th European Conference on Software Architecture . Volume 2 / / Laurence Duchien [and eight others] |
Pubbl/distr/stampa | New York, NY : , : Association for Computing Machinery, , 2019 |
Descrizione fisica | 1 online resource |
Disciplina | 005.7 |
Soggetto topico | Data structures (Computer science) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910412119203321 |
New York, NY : , : Association for Computing Machinery, , 2019 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 2008 Workshop on Middleware Security |
Autore | Scandariato Riccardo |
Pubbl/distr/stampa | [Place of publication not identified], : Association for Computing Machinery, 2008 |
Descrizione fisica | 1 online resource (48 p.;) |
Collana | ACM Other conferences |
Soggetto topico | Information Technology - Computer Science (Hardware & Networks) |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | MidSec '08 |
Record Nr. | UNINA-9910376186703321 |
Scandariato Riccardo
![]() |
||
[Place of publication not identified], : Association for Computing Machinery, 2008 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|