000 | 04601nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-319-30806-7 | ||
003 | DE-He213 | ||
005 | 20240730201800.0 | ||
007 | cr nn 008mamaa | ||
008 | 160330s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319308067 _9978-3-319-30806-7 |
||
024 | 7 |
_a10.1007/978-3-319-30806-7 _2doi |
|
050 | 4 | _aTK5105.5-5105.9 | |
072 | 7 |
_aUKN _2bicssc |
|
072 | 7 |
_aCOM043000 _2bisacsh |
|
072 | 7 |
_aUKN _2thema |
|
082 | 0 | 4 |
_a004.6 _223 |
245 | 1 | 0 |
_aEngineering Secure Software and Systems _h[electronic resource] : _b8th International Symposium, ESSoS 2016, London, UK, April 6-8, 2016. Proceedings / _cedited by Juan Caballero, Eric Bodden, Elias Athanasopoulos. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aX, 269 p. 64 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9639 |
|
505 | 0 | _aSecurity Testing beyond Functional Tests -- Progress-Sensitive Security for SPARK -- Sound and Precise Cross-Layer Data Flow Tracking -- Automatically Extracting Threats from Extended Data Flow Diagrams -- On the Static Analysis of Hybrid Mobile Apps -- Semantics-based Repackaging Detection for Mobile Apps -- Accelerometer-based Device Fingerprinting for Multi-factor Mobile Authentication -- POODLEs, More POODLEs, FREAK Attacks too: How Server Administrators Responded to Three Serious Web Vulnerabilities -- PADS: a platform to detect stealth attacks -- Analyzing the Gadgets - Towards a Metric to Measure Gadget Quality -- Empirical Analysis and Modeling of Black-Box Mutational Fuzzing -- On the Security Cost of Using a Free and Open Source Component in a Proprietary Product -- Idea: Usable Platforms for Secure Programming { Mining Unix for Insight and Guidelines -- AppPAL for Android: Capturing and Checking Mobile App Policies -- Inferring Semantic Mapping Between Policies and Code: The Clue is in the Language -- Idea: Supporting Policy-Based Access Control on Database Systems -- Idea: Enforcing Security Properties by Solving Behavioural Equations. | |
520 | _aThis book constitutes the refereed proceedings of the 8th International Symposium on Engineering Secure Software and Systems, ESSoS 2016, held in London, UK, in April 2016. The 13 full papers presented together with 3 short papers and 1 invited talk were carefully reviewed and selected from 50 submissions. The goal of this symposium, is to bring together researchers and practitioners to advance the states of the art and practice in secure software engineering. The presentations and associated publications at ESSoS 2016 contribute to this goal in several directions: First, by improving methodologies for secure software engineering (such as flow analysis and policy compliance). Second, with results for the detection and analysis of software vulnerabilities and the attacks they enable. Finally, for securing software for specific application domains (such as mobile devices and access control). | ||
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aSoftware engineering. _94138 |
|
650 | 0 |
_aAlgorithms. _93390 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aComputer science. _99832 |
|
650 | 1 | 4 |
_aComputer Communication Networks. _9168697 |
650 | 2 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aSoftware Engineering. _94138 |
650 | 2 | 4 |
_aAlgorithms. _93390 |
650 | 2 | 4 |
_aMathematical Applications in Computer Science. _931683 |
650 | 2 | 4 |
_aModels of Computation. _931806 |
700 | 1 |
_aCaballero, Juan. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9168698 |
|
700 | 1 |
_aBodden, Eric. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9168699 |
|
700 | 1 |
_aAthanasopoulos, Elias. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9168700 |
|
710 | 2 |
_aSpringerLink (Online service) _9168701 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319308050 |
776 | 0 | 8 |
_iPrinted edition: _z9783319308074 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9639 _9168702 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-30806-7 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c96709 _d96709 |