pular para conteúdo
Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings Ver prévia deste item
FecharVer prévia deste item
Checando...

Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings

Autor: Jan Jürjens; Benjamin Livshits; Riccardo Scandariato
Editora: Berlin : Springer, ©2013.
Séries: Lecture notes in computer science, 7781.; LNCS sublibrary., SL 4,, Security and cryptology.
Edição/Formato   e-book : Documento : Publicação de conferência : InglêsVer todas as edições e formatos
Base de Dados:WorldCat
Resumo:
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and  Ler mais...
Classificação:

(ainda não classificado) 0 com críticas - Seja o primeiro.

Assuntos
Mais como este

 

Encontrar uma cópia on-line

Links para este item

Encontrar uma cópia na biblioteca

&AllPage.SpinnerRetrieving; Encontrando bibliotecas que possuem este item...

Detalhes

Gênero/Forma: Electronic books
Conference proceedings
Congresses
Formato Físico Adicional: Print version:
Engineering secure software and systems.
Berlin : Springer, 2013
(OCoLC)827925767
Tipo de Material: Publicação de conferência, Documento, Recurso Internet
Tipo de Documento: Recurso Internet, Arquivo de Computador
Todos os Autores / Contribuintes: Jan Jürjens; Benjamin Livshits; Riccardo Scandariato
ISBN: 9783642365638 3642365639
Número OCLC: 828927897
Notas: International conference proceedings.
Descrição: 1 online resource (xii, 228 pages) : some illustrations.
Conteúdos: Secure Programming. Control-Flow Integrity in Web Applications / Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga --
Using Security Policies to Automate Placement of Network Intrusion Prevention / Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher --
Idea: Callee-Site Rewriting of Sealed System Libraries / Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer --
Policies. Towards Unified Authorization for Android / Michael J. May, Karthikeyan Bhargavan --
Model-Based Usage Control Policy Derivation / Prachi Kumari, Alexander Pretschner --
Compositional Verification of Application-Level Security Properties / Linda Ariani Gunawan, Peter Herrmann --
Proving. Towards Verifying Voter Privacy through Unlinkability / Denis Butin, David Gray, Giampaolo Bella --
Confidentiality for Probabilistic Multi-threaded Programs and Its Verification / Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman --
A Fully Homomorphic Crypto-Processor Design / Peter T. Breuer, Jonathan P. Bowen --
Formal Methods. DKAL*: Constructing Executable Specifications of Authorization Protocols / Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg --
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens --
Idea: Writing Secure C Programs with SecProve / Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer --
Analyzing. Anatomy of Exploit Kits / Vadim Kotov, Fabio Massacci --
An Empirical Study on the Effectiveness of Security Code Review / Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler --
Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming / Bojan Simic, James Walden.
Título da Série: Lecture notes in computer science, 7781.; LNCS sublibrary., SL 4,, Security and cryptology.
Outros Títulos: ESSoS 2013
Responsabilidade: Jan Jürjens, Benjamin Livshits, Riccardo Scandariato (eds.).
Mais informações:

Resumo:

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

Críticas

Críticas contribuídas por usuários
Recuperando críticas GoodReas...
Recuperando comentários DOGObooks

Etiquetas

Seja o primeiro.
Confirmar esta solicitação

Você já pode ter solicitado este item. Por favor, selecione Ok se gostaria de proceder com esta solicitação de qualquer forma.

Dados Ligados


<http://www.worldcat.org/oclc/828927897>
library:oclcnum"828927897"
library:placeOfPublication
library:placeOfPublication
rdf:typeschema:MediaObject
rdf:typeschema:Book
rdf:valueUnknown value: dct
rdf:valueUnknown value: cnp
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:alternateName"ESSoS 2013"@en
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:copyrightYear"2013"
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1211082724>
schema:genre"Electronic books"@en
schema:genre"Conference proceedings"@en
schema:inLanguage"en"
schema:isPartOf
schema:isPartOf
schema:name"Engineering secure software and systems 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings"@en
schema:publication
schema:publisher
schema:url
schema:workExample
schema:workExample
wdrs:describedby

Content-negotiable representations

Close Window

Por favor, conecte-se ao WorldCat 

Não tem uma conta? Você pode facilmente criar uma conta gratuita.