Engineering Secure Software and Systems 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings /

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The...

Full description

Bibliographic Details
Published in:Springer eBooks
Corporate Author: SpringerLink (Online service)
Other Authors: Jürjens, Jan (Editor), Piessens, Frank (Editor), Bielova, Nataliia (Editor)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2014.
Series:Lecture Notes in Computer Science,
Subjects:
Online Access:http://dx.doi.org/10.1007/978-3-319-04897-0
Перейти в каталог НБ ТГУ
LEADER 04062nam a22005895i 4500
001 vtls000542841
003 RU-ToGU
005 20210922082544.0
007 cr nn 008mamaa
008 160915s2014 gw | s |||| 0|eng d
020 |a 9783319048970  |9 978-3-319-04897-0 
024 7 |a 10.1007/978-3-319-04897-0  |2 doi 
035 |a to000542841 
039 9 |y 201609152157  |z Александр Эльверович Гилязов 
040 |a Springer  |c Springer  |d RU-ToGU 
050 4 |a TK5105.5-5105.9 
072 7 |a UKN  |2 bicssc 
072 7 |a COM075000  |2 bisacsh 
082 0 4 |a 004.6  |2 23 
245 1 0 |a Engineering Secure Software and Systems  |h electronic resource  |b 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings /  |c edited by Jan Jürjens, Frank Piessens, Nataliia Bielova. 
260 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014.  |9 742221 
300 |a XVIII, 231 p. 59 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8364 
505 0 |a Model-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. 
520 |a This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications. 
650 0 |a Computer Science.  |9 155490 
650 0 |a Computer Communication Networks.  |9 566243 
650 0 |a Software engineering.  |9 566225 
650 0 |a Data structures (Computer science).  |9 566232 
650 0 |a Data encryption (Computer science).  |9 566260 
650 1 4 |a Computer Science.  |9 155490 
650 2 4 |a Computer Communication Networks.  |9 566243 
650 2 4 |a Data Encryption.  |9 566261 
650 2 4 |a Software Engineering/Programming and Operating Systems.  |9 303115 
650 2 4 |a Data Structures, Cryptology and Information Theory.  |9 566234 
650 2 4 |a Math Applications in Computer Science.  |9 303284 
650 2 4 |a Models and Principles.  |9 303228 
700 1 |a Jürjens, Jan.  |e editor.  |9 319220 
700 1 |a Piessens, Frank.  |e editor.  |9 449446 
700 1 |a Bielova, Nataliia.  |e editor.  |9 449447 
710 2 |a SpringerLink (Online service)  |9 143950 
773 0 |t Springer eBooks 
830 0 |a Lecture Notes in Computer Science,  |9 279505 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-04897-0 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=400737 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645) 
999 |c 400737  |d 400737