跳至内容
Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings 線上預覽
關閉線上預覽
正在查...

Engineering secure software and systems : 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings

作者: Jan Jürjens; Benjamin Livshits; Riccardo Scandariato
出版商: Berlin : Springer, ©2013.
叢書: Lecture notes in computer science, 7781.; LNCS sublibrary., SL 4,, Security and cryptology.
版本/格式:   電子書 : 文獻 : 會議刊物 : 英語所有版本和格式的總覽
資料庫:WorldCat
提要:
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and  再讀一些...
評定級別:

(尚未評分) 0 附有評論 - 成爲第一個。

主題
更多類似這樣的

 

在線上查詢

與資料的連結

在圖書館查詢

&AllPage.SpinnerRetrieving; 正在查詢有此資料的圖書館...

詳細書目

類型/形式: Electronic books
Conference proceedings
Congresses
其他的實體格式: Print version:
Engineering secure software and systems.
Berlin : Springer, 2013
(OCoLC)827925767
資料類型: 會議刊物, 文獻, 網際網路資源
文件類型: 網路資源, 電腦資料
所有的作者/貢獻者: Jan Jürjens; Benjamin Livshits; Riccardo Scandariato
ISBN: 9783642365638 3642365639
OCLC系統控制編碼: 828927897
注意: International conference proceedings.
描述: 1 online resource (xii, 228 pages) : some illustrations.
内容: Secure Programming. Control-Flow Integrity in Web Applications / Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga --
Using Security Policies to Automate Placement of Network Intrusion Prevention / Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher --
Idea: Callee-Site Rewriting of Sealed System Libraries / Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer --
Policies. Towards Unified Authorization for Android / Michael J. May, Karthikeyan Bhargavan --
Model-Based Usage Control Policy Derivation / Prachi Kumari, Alexander Pretschner --
Compositional Verification of Application-Level Security Properties / Linda Ariani Gunawan, Peter Herrmann --
Proving. Towards Verifying Voter Privacy through Unlinkability / Denis Butin, David Gray, Giampaolo Bella --
Confidentiality for Probabilistic Multi-threaded Programs and Its Verification / Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman --
A Fully Homomorphic Crypto-Processor Design / Peter T. Breuer, Jonathan P. Bowen --
Formal Methods. DKAL*: Constructing Executable Specifications of Authorization Protocols / Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg --
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic Services / Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens --
Idea: Writing Secure C Programs with SecProve / Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer --
Analyzing. Anatomy of Exploit Kits / Vadim Kotov, Fabio Massacci --
An Empirical Study on the Effectiveness of Security Code Review / Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler --
Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming / Bojan Simic, James Walden.
叢書名: Lecture notes in computer science, 7781.; LNCS sublibrary., SL 4,, Security and cryptology.
其他題名: ESSoS 2013
責任: Jan Jürjens, Benjamin Livshits, Riccardo Scandariato (eds.).
更多資訊:

摘要:

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

評論

讀者提供的評論
正在擷取GoodReads評論...
正在擷取DOGObooks的評論

標籤

成爲第一個
確認申請

你可能已經申請過這份資料。若還是想申請,請選確認。

連結資料


<http://www.worldcat.org/oclc/828927897>
library:oclcnum"828927897"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/828927897>
rdf:typeschema:Book
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
<http://id.worldcat.org/fast/872341>
rdf:typeschema:Intangible
schema:name"Computer networks--Security measures"@en
schema:name"Computer networks--Security measures."@en
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:contributor
schema:copyrightYear"2013"
schema:creator
schema:datePublished"2013"
schema:description"This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing."@en
schema:exampleOfWork<http://worldcat.org/entity/work/id/1211082724>
schema:genre"Electronic books."@en
schema:genre"Conference proceedings."@en
schema:genre"Conference proceedings"@en
schema:inLanguage"en"
schema:name"ESSoS 2013"@en
schema:name"Engineering secure software and systems 5th international symposium, ESSoS 2013, Paris, France, February 27-March 1, 2013 : proceedings"@en
schema:publisher
schema:url
schema:url<http://dx.doi.org/10.1007/978-3-642-36563-8>
schema:workExample

Content-negotiable representations

關閉視窗

請登入WorldCat 

没有帳號嗎?你可很容易的 建立免費的帳號.