000 | 03830nam a22006015i 4500 | ||
---|---|---|---|
001 | 978-3-319-04897-0 | ||
003 | DE-He213 | ||
005 | 20200421112229.0 | ||
007 | cr nn 008mamaa | ||
008 | 140218s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319048970 _9978-3-319-04897-0 |
||
024 | 7 |
_a10.1007/978-3-319-04897-0 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aEngineering Secure Software and Systems _h[electronic resource] : _b6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings / _cedited by Jan J�urjens, Frank Piessens, Nataliia Bielova. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
|
300 |
_aXVIII, 231 p. 59 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8364 |
|
505 | 0 | _aModel-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. | |
520 | _aThis book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer communication systems. | |
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aData structures (Computer science). | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 0 | _aComputers. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aSoftware Engineering/Programming and Operating Systems. |
650 | 2 | 4 | _aData Structures, Cryptology and Information Theory. |
650 | 2 | 4 | _aMath Applications in Computer Science. |
650 | 2 | 4 | _aModels and Principles. |
700 | 1 |
_aJ�urjens, Jan. _eeditor. |
|
700 | 1 |
_aPiessens, Frank. _eeditor. |
|
700 | 1 |
_aBielova, Nataliia. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783319048963 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8364 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-04897-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57853 _d57853 |