Engineering Secure Software and Systems : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 sub...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Jürjens Jan (Directeur de publication), Livshits Ben (Directeur de publication), Scandariato Riccardo (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Engineering Secure Software and Systems : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings / edited by Jan Jürjens, Benjamin Livshits, Riccardo Scandariato.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2013
Cham : Springer Nature
Collection : Security and Cryptology ; 7781
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Note sur l'URL : Accès sur la plateforme de l'éditeur
Accès sur la plateforme Istex
Condition d'utilisation et de reproduction : Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017
Sujets :
Documents associés : Autre format: Engineering Secure Software and Systems
Autre format: Engineering Secure Software and Systems
  • Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention
  • Idea: Callee-Site Rewriting of Sealed System Libraries
  • Towards Unified Authorization for Android
  • Model-Based Usage Control Policy Derivation
  • Compositional Verification of Application-Level Security Properties
  • Towards Verifying Voter Privacy through Unlinkability
  • Confidentiality for Probabilistic Multi-threaded Programs and Its Verification
  • A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer
  • DKAL: Constructing Executable Specifications of Authorization Protocols
  • A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services
  • Idea: Writing Secure C Programs with SecProve
  • Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts
  • An Empirical Study on the Effectiveness of Security Code Review
  • Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.