Engineering Secure Software and Systems: 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012, Proceedings
Gilles Barthe, Ben Livshits, Riccardo Scandariato
Springer Science & Business Media, Jan 30, 2012 - Computers - 151 pages
This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012, held in Eindhoven, The Netherlands, in February 2012. The 7 revised full papers presented together with 7 idea papers were carefully reviewed and selected from 53 submissions. The full papers present new research results in the field of engineering secure software and systems, whereas the idea papers give crisp expositions of interesting, novel ideas in the early stages of development.
What people are saying - Write a review
We haven't found any reviews in the usual places.
When the Garbage Collector Gets Confused
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Enginee...
Typed Assembler for a RISC CryptoProcessor
Transversal Policy Conflict Detection
Challenges in Implementing an EndtoEnd Secure Protocol for Java MEBased Mobile Data Collection in LowBudget Settings
Runtime Enforcement of Information Flow Security in Tree Manipulating Processes
Formalisation and Implementation of the XACML Access Control Mechanism
A Task Ordering Approach for Automatic Trust Establishment
An Idea of an Independent Validation of Vulnerability Discovery Models
A Sound Decision Procedure for the Compositionality of Secrecy
Attack Strategies and Defense Techniques
Design of Adaptive Security Mechanisms for RealTime Embedded Systems
Hunting ApplicationLevel Logical Errors
Optimal Trust Mining and Computingon Keyed Map Reduce
Other editions - View all
3DES Abstract Syntax Tree access control analysis Android APP_LogGIC application instance approach AST-Coverage AST-Distance attacker binary byte-code conflicts consider constraint context CPU load crypto-processor defined definition detection document downloads embedded systems encrypted data encryption algorithms entities evaluation execution Firefox formal Fuzzy Logic garbage collection goodness-of-fit Heidelberg IEEE implementation input ISMS ISO 27001 standard Java Card Java Card 3.0 keyed MapReduce keyword language Livshits LNCS logic malware MapReduce MapReduce function match mobile monitor obfuscation objects p-value paper perform plagiarized plagiarized applications proposed protocol real-time reference request RISC risk rule runtime Scandariato Eds secrecy Section semantics server smartphone specific Springer SRE methods stack syntax target Targets|)R task tion tool tree trust computing trust graph trust metrics trust mining trust values tuple unencrypted uploads variable VDMs vulnerabilities XACML XACML policies