跳到内容
Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings 预览资料
关闭预览资料
正在查...

Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings

著者: Jan Jürjens; Benjamin Livshits; Riccardo Scandariato
出版商: Berlin : Springer, ©2013.
丛书: Lecture notes in computer science, 7781.; LNCS sublibrary., SL 4,, Security and cryptology.
版本/格式:   电子图书 : 文献 : 会议刊物 : 英语查看所有的版本和格式
数据库:WorldCat
提要:
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and  再读一些...
评估:

(尚未评估) 0 附有评论 - 争取成为第一个。

主题
更多类似这样的

 

在线查找

与资料的链接

在图书馆查找

&AllPage.SpinnerRetrieving; 正在查找有这资料的图书馆...

详细书目

类型/形式: Electronic books
Conference proceedings
Congresses
附加的形体格式: Print version:
Engineering secure software and systems.
Berlin : Springer, 2013
(OCoLC)827925767
材料类型: 会议刊物, 文献, 互联网资源
文件类型: 互联网资源, 计算机文档
所有的著者/提供者: Jan Jürjens; Benjamin Livshits; Riccardo Scandariato
ISBN: 9783642365638 3642365639
OCLC号码: 828927897
注意: International conference proceedings.
描述: 1 online resource (xii, 228 pages) : some illustrations.
内容: Secure Programming. Control-Flow Integrity in Web Applications / Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga --
Using Security Policies to Automate Placement of Network Intrusion Prevention / Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher --
Idea: Callee-Site Rewriting of Sealed System Libraries / Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer --
Policies. Towards Unified Authorization for Android / Michael J. May, Karthikeyan Bhargavan --
Model-Based Usage Control Policy Derivation / Prachi Kumari, Alexander Pretschner --
Compositional Verification of Application-Level Security Properties / Linda Ariani Gunawan, Peter Herrmann --
Proving. Towards Verifying Voter Privacy through Unlinkability / Denis Butin, David Gray, Giampaolo Bella --
Confidentiality for Probabilistic Multi-threaded Programs and Its Verification / Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman --
A Fully Homomorphic Crypto-Processor Design / Peter T. Breuer, Jonathan P. Bowen --
Formal Methods. DKAL*: Constructing Executable Specifications of Authorization Protocols / Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg --
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens --
Idea: Writing Secure C Programs with SecProve / Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer --
Analyzing. Anatomy of Exploit Kits / Vadim Kotov, Fabio Massacci --
An Empirical Study on the Effectiveness of Security Code Review / Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler --
Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming / Bojan Simic, James Walden.
丛书名: Lecture notes in computer science, 7781.; LNCS sublibrary., SL 4,, Security and cryptology.
其他题名: ESSoS 2013
责任: Jan Jürjens, Benjamin Livshits, Riccardo Scandariato (eds.).
更多信息:

摘要:

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

评论

用户提供的评论
正在获取GoodReads评论...
正在检索DOGObooks的评论

标签

争取是第一个!
确认申请

你可能已经申请过这份资料。如果还是想申请,请选确认。

链接数据


<http://www.worldcat.org/oclc/828927897>
library:oclcnum"828927897"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/828927897>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"@en
schema:name"Computer networks--Security measures."@en
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:copyrightYear"2013"
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1211082724>
schema:genre"Electronic books."@en
schema:genre"Conference proceedings."@en
schema:genre"Conference proceedings"@en
schema:inLanguage"en"
schema:name"ESSoS 2013"@en
schema:name"Engineering secure software and systems 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings"@en
schema:publisher
schema:url
schema:url<http://dx.doi.org/10.1007/978-3-642-36563-8>
schema:workExample

Content-negotiable representations

关闭窗口

请登入WorldCat 

没有张号吗?很容易就可以 建立免费的账号.