000 | 03926nam a22005775i 4500 | ||
---|---|---|---|
001 | vtls000542841 | ||
003 | RU-ToGU | ||
005 | 20210922082544.0 | ||
007 | cr nn 008mamaa | ||
008 | 160915s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319048970 _9978-3-319-04897-0 |
||
024 | 7 |
_a10.1007/978-3-319-04897-0 _2doi |
|
035 | _ato000542841 | ||
040 |
_aSpringer _cSpringer _dRU-ToGU |
||
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM075000 _2bisacsh |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aEngineering Secure Software and Systems _helectronic resource _b6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014, Proceedings / _cedited by Jan Jürjens, Frank Piessens, Nataliia Bielova. |
260 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2014. |
||
300 |
_aXVIII, 231 p. 59 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8364 |
|
505 | 0 | _aModel-Based Security -- Detecting Code Reuse Attacks with a Model of Conformant Program Execution -- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies -- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services -- Formal Methods -- Automated Formal Verification of Application-Specific Security Properties -- Fault-Tolerant Non-interference -- Quantitative Security Analysis for Programs with Low Input and Noisy Output -- A Modeling and Formal Approach for the Precise Specification of Security Patterns -- On the Relation between Redactable and Sanitizable Signature Schemes -- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer -- Web and Mobile Security -- Architectures for Inlining Security Monitors in Web Applications -- Automatic and Robust Client-Side Protection for Cookie-Based Sessions -- Security Testing of GSM Implementations -- Applications -- User-Centric Security Assessment of Software Configurations: A Case Study -- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard. | |
520 | _aThis book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014. The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications. | ||
650 | 0 |
_aComputer Science. _9155490 |
|
650 | 0 |
_aComputer Communication Networks. _9566243 |
|
650 | 0 |
_aSoftware engineering. _9566225 |
|
650 | 0 |
_aData structures (Computer science). _9566232 |
|
650 | 0 |
_aData encryption (Computer science). _9566260 |
|
650 | 1 | 4 |
_aComputer Science. _9155490 |
650 | 2 | 4 |
_aComputer Communication Networks. _9566243 |
650 | 2 | 4 |
_aData Encryption. _9566261 |
650 | 2 | 4 |
_aSoftware Engineering/Programming and Operating Systems. _9303115 |
650 | 2 | 4 |
_aData Structures, Cryptology and Information Theory. _9566234 |
650 | 2 | 4 |
_aMath Applications in Computer Science. _9303284 |
650 | 2 | 4 |
_aModels and Principles. _9303228 |
700 | 1 |
_aJürjens, Jan. _eeditor. _9319220 |
|
700 | 1 |
_aPiessens, Frank. _eeditor. _9449446 |
|
700 | 1 |
_aBielova, Nataliia. _eeditor. _9449447 |
|
710 | 2 |
_aSpringerLink (Online service) _9143950 |
|
773 | 0 | _tSpringer eBooks | |
830 | 0 |
_aLecture Notes in Computer Science, _9279505 |
|
856 | 4 | 0 | _uhttp://dx.doi.org/10.1007/978-3-319-04897-0 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-LNC | ||
999 | _c400737 |