コンテンツへ移動
Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings 資料のプレビュー
閉じる資料のプレビュー
確認中…

Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings

著者: Jan Jürjens; Benjamin Livshits; Riccardo Scandariato
出版: Berlin : Springer, ©2013.
シリーズ: Lecture notes in computer science, 7781.; LNCS sublibrary., SL 4,, Security and cryptology.
エディション/フォーマット:   電子書籍 : Document : Conference publication : Englishすべてのエディションとフォーマットを見る
データベース:WorldCat
概要:
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and  続きを読む
評価:

(まだ評価がありません) 0 件のレビュー - 是非あなたから!

件名:
関連情報:

 

オンラインで入手

この資料へのリンク

オフラインで入手

&AllPage.SpinnerRetrieving; この資料の所蔵館を検索中…

詳細

ジャンル/形式: Electronic books
Conference proceedings
Congresses
その他のフォーマット: Print version:
Engineering secure software and systems.
Berlin : Springer, 2013
(OCoLC)827925767
資料の種類: Conference publication, Document, インターネット資料
ドキュメントの種類: インターネットリソース, コンピューターファイル
すべての著者/寄与者: Jan Jürjens; Benjamin Livshits; Riccardo Scandariato
ISBN: 9783642365638 3642365639
OCLC No.: 828927897
注記: International conference proceedings.
物理形態: 1 online resource (xii, 228 pages) : some illustrations.
コンテンツ: Secure Programming. Control-Flow Integrity in Web Applications / Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga --
Using Security Policies to Automate Placement of Network Intrusion Prevention / Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher --
Idea: Callee-Site Rewriting of Sealed System Libraries / Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer --
Policies. Towards Unified Authorization for Android / Michael J. May, Karthikeyan Bhargavan --
Model-Based Usage Control Policy Derivation / Prachi Kumari, Alexander Pretschner --
Compositional Verification of Application-Level Security Properties / Linda Ariani Gunawan, Peter Herrmann --
Proving. Towards Verifying Voter Privacy through Unlinkability / Denis Butin, David Gray, Giampaolo Bella --
Confidentiality for Probabilistic Multi-threaded Programs and Its Verification / Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman --
A Fully Homomorphic Crypto-Processor Design / Peter T. Breuer, Jonathan P. Bowen --
Formal Methods. DKAL*: Constructing Executable Specifications of Authorization Protocols / Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg --
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens --
Idea: Writing Secure C Programs with SecProve / Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer --
Analyzing. Anatomy of Exploit Kits / Vadim Kotov, Fabio Massacci --
An Empirical Study on the Effectiveness of Security Code Review / Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler --
Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming / Bojan Simic, James Walden.
シリーズタイトル: Lecture notes in computer science, 7781.; LNCS sublibrary., SL 4,, Security and cryptology.
その他のタイトル: ESSoS 2013
責任者: Jan Jürjens, Benjamin Livshits, Riccardo Scandariato (eds.).
その他の情報:

概要:

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

レビュー

ユーザーレビュー
GoodReadsのレビューを取得中…
DOGObooksのレビューを取得中…

タグ

まずはあなたから!
リクエストの確認

あなたは既にこの資料をリクエストしている可能性があります。このリクエストを続行してよろしければ、OK を選択してください。

リンクデータ


<http://www.worldcat.org/oclc/828927897>
library:oclcnum"828927897"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/828927897>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"@en
schema:name"Computer networks--Security measures."@en
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:copyrightYear"2013"
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1211082724>
schema:genre"Electronic books."@en
schema:genre"Conference proceedings."@en
schema:genre"Conference proceedings"@en
schema:inLanguage"en"
schema:name"ESSoS 2013"@en
schema:name"Engineering secure software and systems 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings"@en
schema:publisher
schema:url
schema:url<http://dx.doi.org/10.1007/978-3-642-36563-8>
schema:workExample

Content-negotiable representations

ウインドウを閉じる

WorldCatにログインしてください 

アカウントをお持ちではないですか?簡単に 無料アカウントを作成することができます。.