Engineering Secure Software and Systems : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 sub...
Enregistré dans:
Auteurs principaux : | , , |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Engineering Secure Software and Systems : 5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings / edited by Jan Jürjens, Benjamin Livshits, Riccardo Scandariato. |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7781 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Engineering Secure Software and Systems Autre format: Engineering Secure Software and Systems |
- Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention
- Idea: Callee-Site Rewriting of Sealed System Libraries
- Towards Unified Authorization for Android
- Model-Based Usage Control Policy Derivation
- Compositional Verification of Application-Level Security Properties
- Towards Verifying Voter Privacy through Unlinkability
- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification
- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer
- DKAL: Constructing Executable Specifications of Authorization Protocols
- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services
- Idea: Writing Secure C Programs with SecProve
- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts
- An Empirical Study on the Effectiveness of Security Code Review
- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.