menu
{ "item_title" : "Engineering Secure Software and Systems", "item_author" : [" Jan Jürjens", "Ben Livshits", "Riccardo Scandariato "], "item_description" : "Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention.- Idea: Callee-Site Rewriting of Sealed System Libraries.- Towards Unified Authorization for Android.- Model-Based Usage Control Policy Derivation.- Compositional Verification of Application-Level Security Properties.- Towards Verifying Voter Privacy through Unlinkability.- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification.- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer.- DKAL: Constructing Executable Specifications of Authorization Protocols.- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services.- Idea: Writing Secure C Programs with SecProve.- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts.- An Empirical Study on the Effectiveness of Security Code Review.- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.", "item_img_path" : "https://covers2.booksamillion.com/covers/bam/3/64/236/562/3642365620_b.jpg", "price_data" : { "retail_price" : "72.00", "online_price" : "72.00", "our_price" : "72.00", "club_price" : "72.00", "savings_pct" : "0", "savings_amt" : "0.00", "club_savings_pct" : "0", "club_savings_amt" : "0.00", "discount_pct" : "10", "store_price" : "" } }
Engineering Secure Software and Systems|Jan Jürjens

Engineering Secure Software and Systems : 5th International Symposium, Essos 2013, Paris, France, February 27 - March 1, 2013. Proceedings

local_shippingShip to Me
In Stock.
FREE Shipping for Club Members help

Overview

Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention.- Idea: Callee-Site Rewriting of Sealed System Libraries.- Towards Unified Authorization for Android.- Model-Based Usage Control Policy Derivation.- Compositional Verification of Application-Level Security Properties.- Towards Verifying Voter Privacy through Unlinkability.- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification.- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer.- DKAL: Constructing Executable Specifications of Authorization Protocols.- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services.- Idea: Writing Secure C Programs with SecProve.- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts.- An Empirical Study on the Effectiveness of Security Code Review.- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.

This item is Non-Returnable

Details

  • ISBN-13: 9783642365621
  • ISBN-10: 3642365620
  • Publisher: Springer
  • Publish Date: January 2013
  • Dimensions: 9.21 x 6.14 x 0.51 inches
  • Shipping Weight: 0.76 pounds
  • Page Count: 231

Related Categories

You May Also Like...

    1

BAM Customer Reviews