• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام

عنوان
Engineering Secure Software and Systems :

پدید آورنده
edited by Jan Jürjens, Benjamin Livshits, Riccardo Scandariato.

موضوع
Computer Communication Networks.,Computer science.,Software engineering.

رده

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3642365639
(Number (ISBN
9783642365638

NATIONAL BIBLIOGRAPHY NUMBER

Number
b567804

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Engineering Secure Software and Systems :
General Material Designation
[Book]
Other Title Information
5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings
First Statement of Responsibility
edited by Jan Jürjens, Benjamin Livshits, Riccardo Scandariato.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Berlin, Heidelberg
Name of Publisher, Distributor, etc.
Springer Berlin Heidelberg : Imprint : Springer
Date of Publication, Distribution, etc.
2013

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
(XII, 231 pages 40 illustrations)

SERIES

Series Title
Lecture notes in computer science, 7781.

CONTENTS NOTE

Text of Note
Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention --; Idea: Callee-Site Rewriting of Sealed System Libraries --; Towards Unified Authorization for Android --; Model-Based Usage Control Policy Derivation --; Compositional Verification of Application-Level Security Properties --; Towards Verifying Voter Privacy through Unlinkability --; Confidentiality for Probabilistic Multi-threaded Programs and Its Verification --; A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer --; DKAL: Constructing Executable Specifications of Authorization Protocols --; A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services --; Idea: Writing Secure C Programs with SecProve --; Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts --; An Empirical Study on the Effectiveness of Security Code Review --; Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.

SUMMARY OR ABSTRACT

Text of Note
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

TOPICAL NAME USED AS SUBJECT

Computer Communication Networks.
Computer science.
Software engineering.

PERSONAL NAME - PRIMARY RESPONSIBILITY

edited by Jan Jürjens, Benjamin Livshits, Riccardo Scandariato.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Benjamin Livshits
Jan Jürjens
Riccardo Scandariato

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival