Amazon cover image
Image from Amazon.com

Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings / Jan Jürjens, Benjamin Livshits, Riccardo Scandariato (eds.).

By: Contributor(s): Material type: TextTextSeries: Lecture notes in computer science ; 7781. | LNCS sublibrary. SL 4, Security and cryptology.Publication details: Berlin : Springer, ©2013.Description: 1 online resource (xii, 228 pages) : some illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783642365638
  • 3642365639
Other title:
  • ESSoS 2013
Subject(s): Genre/Form: Additional physical formats: Print version:: Engineering secure software and systems.DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 E87 2013
NLM classification:
  • QA 76.9.A25
Other classification:
  • 51.52
Online resources:
Contents:
Secure Programming. Control-Flow Integrity in Web Applications / Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga -- Using Security Policies to Automate Placement of Network Intrusion Prevention / Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher -- Idea: Callee-Site Rewriting of Sealed System Libraries / Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer -- Policies. Towards Unified Authorization for Android / Michael J. May, Karthikeyan Bhargavan -- Model-Based Usage Control Policy Derivation / Prachi Kumari, Alexander Pretschner -- Compositional Verification of Application-Level Security Properties / Linda Ariani Gunawan, Peter Herrmann -- Proving. Towards Verifying Voter Privacy through Unlinkability / Denis Butin, David Gray, Giampaolo Bella -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification / Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman -- A Fully Homomorphic Crypto-Processor Design / Peter T. Breuer, Jonathan P. Bowen -- Formal Methods. DKAL*: Constructing Executable Specifications of Authorization Protocols / Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg -- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens -- Idea: Writing Secure C Programs with SecProve / Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer -- Analyzing. Anatomy of Exploit Kits / Vadim Kotov, Fabio Massacci -- An Empirical Study on the Effectiveness of Security Code Review / Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler -- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming / Bojan Simic, James Walden.
In: Springer eBooksSummary: This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library eBook LNCS Available
Total holds: 0

Secure Programming. Control-Flow Integrity in Web Applications / Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga -- Using Security Policies to Automate Placement of Network Intrusion Prevention / Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher -- Idea: Callee-Site Rewriting of Sealed System Libraries / Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer -- Policies. Towards Unified Authorization for Android / Michael J. May, Karthikeyan Bhargavan -- Model-Based Usage Control Policy Derivation / Prachi Kumari, Alexander Pretschner -- Compositional Verification of Application-Level Security Properties / Linda Ariani Gunawan, Peter Herrmann -- Proving. Towards Verifying Voter Privacy through Unlinkability / Denis Butin, David Gray, Giampaolo Bella -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification / Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman -- A Fully Homomorphic Crypto-Processor Design / Peter T. Breuer, Jonathan P. Bowen -- Formal Methods. DKAL*: Constructing Executable Specifications of Authorization Protocols / Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg -- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens -- Idea: Writing Secure C Programs with SecProve / Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer -- Analyzing. Anatomy of Exploit Kits / Vadim Kotov, Fabio Massacci -- An Empirical Study on the Effectiveness of Security Code Review / Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler -- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming / Bojan Simic, James Walden.

Includes bibliographical references and author index.

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

Print version record.

English.

Powered by Koha