000 04476nam a22006735i 4500
001 978-3-642-00199-4
003 DE-He213
005 20240730182912.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 _a9783642001994
_9978-3-642-00199-4
024 7 _a10.1007/978-3-642-00199-4
_2doi
050 4 _aQA76.9.A25
072 7 _aUR
_2bicssc
072 7 _aUTN
_2bicssc
072 7 _aCOM053000
_2bisacsh
072 7 _aUR
_2thema
072 7 _aUTN
_2thema
082 0 4 _a005.8
_223
245 1 0 _aEngineering Secure Software and Systems
_h[electronic resource] :
_bFirst International Symposium, ESSoS 2009 Leuven, Belgium, February 4-6, 2009, Proceedings /
_cedited by Fabio MASSACCI, Samuel Redwine, Nicola Zannone.
250 _a1st ed. 2009.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2009.
300 _aX, 201 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v5429
505 0 _aPolicy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results.
520 _aThis book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in Leuven, Belgium, in February 2009. The 10 revised full papers presented together with 7 industry reports and ideas papers were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance.
650 0 _aData protection.
_97245
650 0 _aSoftware engineering.
_94138
650 0 _aOperating systems (Computers).
_95329
650 0 _aAlgorithms.
_93390
650 0 _aElectronic data processing
_xManagement.
_9129609
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 1 4 _aData and Information Security.
_931990
650 2 4 _aSoftware Engineering.
_94138
650 2 4 _aOperating Systems.
_937074
650 2 4 _aAlgorithms.
_93390
650 2 4 _aIT Operations.
_931703
650 2 4 _aCryptology.
_931769
700 1 _aMASSACCI, Fabio.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9129610
700 1 _aRedwine, Samuel.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9129611
700 1 _aZannone, Nicola.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9129612
710 2 _aSpringerLink (Online service)
_9129613
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642001987
776 0 8 _iPrinted edition:
_z9783642002007
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v5429
_9129614
856 4 0 _uhttps://doi.org/10.1007/978-3-642-00199-4
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c91554
_d91554