Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings / Jan Jürjens, Benjamin Livshits, Riccardo Scandariato (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 7781. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin : Springer, ©2013.Description: 1 online resource (xii, 228 pages) : some illustrationsContent type: - text
- computer
- online resource
- 9783642365638
- 3642365639
- ESSoS 2013
- Computer security -- Congresses
- Computer networks -- Security measures -- Congresses
- Software engineering -- Congresses
- Computer security
- Computer networks
- Computer Security
- Computer Communication Networks
- Software
- Sécurité informatique -- Congrès
- Réseaux d'ordinateurs -- Sécurité -- Mesures -- Congrès
- Génie logiciel -- Congrès
- Sécurité informatique
- Réseaux d'ordinateurs
- Logiciels
- software
- Computer networks
- Computer networks -- Security measures
- Computer security
- Software engineering
- computerwetenschappen
- computer sciences
- wiskunde
- mathematics
- informatietheorie
- information theory
- gegevensstructuren
- data structures
- modellen
- models
- software engineering
- operating systems
- gegevensbeheer
- data management
- computernetwerken
- computer networks
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8 23
- QA76.9.A25 E87 2013
- QA 76.9.A25
- 51.52
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
Secure Programming. Control-Flow Integrity in Web Applications / Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga -- Using Security Policies to Automate Placement of Network Intrusion Prevention / Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher -- Idea: Callee-Site Rewriting of Sealed System Libraries / Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer -- Policies. Towards Unified Authorization for Android / Michael J. May, Karthikeyan Bhargavan -- Model-Based Usage Control Policy Derivation / Prachi Kumari, Alexander Pretschner -- Compositional Verification of Application-Level Security Properties / Linda Ariani Gunawan, Peter Herrmann -- Proving. Towards Verifying Voter Privacy through Unlinkability / Denis Butin, David Gray, Giampaolo Bella -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification / Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman -- A Fully Homomorphic Crypto-Processor Design / Peter T. Breuer, Jonathan P. Bowen -- Formal Methods. DKAL*: Constructing Executable Specifications of Authorization Protocols / Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg -- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens -- Idea: Writing Secure C Programs with SecProve / Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer -- Analyzing. Anatomy of Exploit Kits / Vadim Kotov, Fabio Massacci -- An Empirical Study on the Effectiveness of Security Code Review / Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler -- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming / Bojan Simic, James Walden.
Includes bibliographical references and author index.
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.
Print version record.
English.