Check nearby libraries
Buy this book
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.
Publish Date
2013
Publisher
Springer Berlin Heidelberg,
Imprint: Springer
Language
English
Pages
229
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Models and Principles, Software Engineering/Programming and Operating Systems, Cryptology and Information Theory Data Structures, Software engineering, Data structures (Computer science), Math Applications in Computer Science, Computer Communication Networks, Data Encryption, Computer science, Data encryption (Computer science), Computer security, Congresses, Computer networks, Security measures, Computer networks, security measures, Computers, access controlShowing 5 featured editions. View all 5 editions?
Book Details
Table of Contents
Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention
Idea: Callee-Site Rewriting of Sealed System Libraries
Towards Unified Authorization for Android
Model-Based Usage Control Policy Derivation
Compositional Verification of Application-Level Security Properties
Towards Verifying Voter Privacy through Unlinkability
Confidentiality for Probabilistic Multi-threaded Programs and Its Verification
A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer
DKAL: Constructing Executable Specifications of Authorization Protocols
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services
Idea: Writing Secure C Programs with SecProve
Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts
An Empirical Study on the Effectiveness of Security Code Review
Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.
Edition Notes
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?December 29, 2021 | Edited by ImportBot | import existing book |
November 12, 2020 | Edited by MARC Bot | import existing book |
June 30, 2019 | Created by MARC Bot | import new book |