Engineering Secure Software and Systems : 5th International Symposium, Essos 2013, Paris, France, February 27 - March 1, 2013. Proceedings
Overview
Control-Flow Integrity in Web Applications Using Security Policies to Automate Placement of Network Intrusion Prevention.- Idea: Callee-Site Rewriting of Sealed System Libraries.- Towards Unified Authorization for Android.- Model-Based Usage Control Policy Derivation.- Compositional Verification of Application-Level Security Properties.- Towards Verifying Voter Privacy through Unlinkability.- Confidentiality for Probabilistic Multi-threaded Programs and Its Verification.- A Fully Homomorphic Crypto-Processor Design: Correctness of a Secret Computer.- DKAL: Constructing Executable Specifications of Authorization Protocols.- A Formal Approach for Inspecting Privacy and Trust in Advanced Electronic services.- Idea: Writing Secure C Programs with SecProve.- Anatomy of Exploit Kits: Preliminary Analysis of Exploit Kits as Software Artefacts.- An Empirical Study on the Effectiveness of Security Code Review.- Eliminating SQL Injection and Cross Site Scripting Using Aspect Oriented Programming.
This item is Non-Returnable
Customers Also Bought
Details
- ISBN-13: 9783642365621
- ISBN-10: 3642365620
- Publisher: Springer
- Publish Date: January 2013
- Dimensions: 9.21 x 6.14 x 0.51 inches
- Shipping Weight: 0.76 pounds
- Page Count: 231
Related Categories
