Engineering Secure Software and Systems

5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read
Not in Library

My Reading Lists:

Create a new list

Check-In

×Close
Add an optional check-in date. Check-in dates are used to track yearly reading goals.
Today

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read


Download Options

Buy this book

Last edited by ImportBot
December 29, 2021 | History

Engineering Secure Software and Systems

5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

  • 0 Ratings
  • 1 Want to read
  • 0 Currently reading
  • 0 Have read

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

Publish Date
Language
English
Pages
229

Buy this book

Previews available in: English

Book Details


Table of Contents

Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention
Idea: Callee-Site Rewriting of Sealed System Libraries
Towards Unified Authorization for Android
Model-Based Usage Control Policy Derivation
Compositional Verification of Application-Level Security Properties
Towards Verifying Voter Privacy through Unlinkability
Confidentiality for Probabilistic Multi-threaded Programs and Its Verification
A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer
DKAL: Constructing Executable Specifications of Authorization Protocols
A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services
Idea: Writing Secure C Programs with SecProve
Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts
An Empirical Study on the Effectiveness of Security Code Review
Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.

Edition Notes

Published in
Berlin, Heidelberg
Series
Lecture Notes in Computer Science -- 7781

Classifications

Dewey Decimal Class
004.6
Library of Congress
TK5105.5-5105.9, QA76.9.A25 E86 2013

The Physical Object

Format
[electronic resource] :
Pagination
XII, 229 p. 40 illus.
Number of pages
229

ID Numbers

Open Library
OL27036423M
Internet Archive
engineeringsecur00brau
ISBN 13
9783642365638
LCCN
2013930843

Community Reviews (0)

Feedback?
No community reviews have been submitted for this work.

Lists

This work does not appear on any lists.

History

Download catalog record: RDF / JSON
December 29, 2021 Edited by ImportBot import existing book
November 12, 2020 Edited by MARC Bot import existing book
June 30, 2019 Created by MARC Bot import new book