Engineering Secure Software and Systems : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 sub...
Enregistré dans:
Auteurs principaux : | , , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Engineering Secure Software and Systems : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings / edited by Jan Jürjens, Benjamin Livshits, Riccardo Scandariato. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7781 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Engineering Secure Software and Systems Autre format: Engineering Secure Software and Systems |
LEADER | 04626clm a2200721 4500 | ||
---|---|---|---|
001 | PPN168330253 | ||
003 | http://www.sudoc.fr/168330253 | ||
005 | 20241001155200.0 | ||
010 | |a 978-3-642-36563-8 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-36563-8 |2 DOI |
035 | |a (OCoLC)829434162 | ||
035 | |a Springer978-3-642-36563-8 | ||
035 | |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-36563-8 | ||
035 | |a Springer-11645-978-3-642-36563-8 | ||
100 | |a 20130325d2013 u |0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Engineering Secure Software and Systems |e 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings |f edited by Jan Jürjens, Benjamin Livshits, Riccardo Scandariato. | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2013 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 7781 | |
330 | |a This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing. | ||
359 | 1 | |a Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention -- Idea: Callee-Site Rewriting of Sealed System Libraries -- Towards Unified Authorization for Android -- Model-Based Usage Control Policy Derivation -- Compositional Verification of Application-Level Security Properties -- Towards Verifying Voter Privacy through Unlinkability -- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification -- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer -- DKAL: Constructing Executable Specifications of Authorization Protocols -- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services -- Idea: Writing Secure C Programs with SecProve -- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts -- An Empirical Study on the Effectiveness of Security Code Review -- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming. | |
371 | 0 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | |
371 | 0 | |a Accès soumis à abonnement pour tout autre établissement | |
371 | 1 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 7781 | |
452 | | | |t Engineering Secure Software and Systems |b Texte imprimé |y 9783642365621 | |
452 | | | |t Engineering Secure Software and Systems |b Texte imprimé |y 9783642365645 | |
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Data Structures, Cryptology and Information Theory | |
610 | 2 | |a Software Engineering/Programming and Operating Systems | |
610 | 2 | |a Math Applications in Computer Science | |
610 | 2 | |a Models and Principles | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Cryptology. | |
610 | 2 | |a Data Structures and Information Theory. | |
610 | 2 | |a Software Engineering | |
610 | 2 | |a Mathematical Applications in Computer Science | |
610 | 2 | |a Models of Computation | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 004.6 |v 23 | ||
680 | |a TK5105.5-5105.9 | ||
700 | 1 | |a Jürjens |b Jan |4 651 | |
701 | 1 | |a Livshits |b Ben |4 651 | |
701 | 1 | |a Scandariato |b Riccardo |4 651 | |
801 | 3 | |a FR |b Abes |c 20240814 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20231204 |g AACR2 | |
856 | 4 | |q PDF |u https://doi.org/10.1007/978-3-642-36563-8 |z Accès sur la plateforme de l'éditeur | |
856 | 4 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-D81XKQ7H-P |z Accès sur la plateforme Istex | |
856 | 4 | |5 441099901:83085746X |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-36563-8 | |
915 | |5 441099901:83085746X |b SPRING13-00768 | ||
930 | |5 441099901:83085746X |b 441099901 |j g | ||
991 | |5 441099901:83085746X |a Exemplaire créé en masse par ITEM le 30-09-2024 16:14 | ||
997 | |a NUM |b SPRING13-00768 |d NUMpivo |e EM |s d | ||
998 | |a 978594 |