Engineering secure software and systems : First international symposium, ESSoS 2009, Leuven, Belgium, February 2009, proceedings / Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone (eds.).

This book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in Leuven, Belgium, in February 2009. The 10 revised full papers presented together with 7 industry reports and ideas papers were carefully reviewed and se...

Full description

Saved in:
Bibliographic Details
Main Authors: Massacci, Fabio (Author), Redwine, Samuel T. (Author), Zannone, Nicola (Author)
Corporate Author: ESSoS (Symposium) Louvain, Belgium)
Format: Ebook
Language:English
Published: Berlin : Springer, [2009]
Series:Lecture notes in computer science ; 5429.
Subjects:
Online Access:Springer eBooks

MARC

LEADER 00000czm a2200000 i 4500
005 20221116125536.0
006 m o d
007 cr cn|||||||||
008 090522s2009 gw a ob 101 0 eng d
011 |a Z3950 Search: @or @or @attr 1=7 "9783642001987" @attr 1=7 "9783642002007" @attr 1=7 "9783642001994" 
011 |a Z3950 Record: 0 of 35 
020 |a 364200198X  |q Internet 
020 |a 9783642001987  |q Internet 
020 |a 3642002005  |q Internet 
020 |a 9783642002007  |q Internet 
020 |a 3642001998  |q Internet 
020 |a 9783642001994  |q Internet 
035 |a (OCoLC)341742525 
035 |a (EDS)EDS485403 
037 |a 978-3-642-00198-7  |b Springer  |n http://www.springerlink.com 
040 |a GW5XE  |b eng  |e rda  |c GW5XE  |d WAU  |d OCLCQ  |d OCLCO  |d OCLCA  |d E7B  |d IAD  |d OCLCF  |d BEDGE  |d NUI  |d OCL  |d EBLCP  |d UAB  |d ESU  |d BUF  |d U3W  |d WYU  |d W2U  |d CNTRU  |d UKAHL  |d COM  |d Z5A 
050 4 |a QA76.9.A25  |b E54 2009 
082 0 4 |a 005.8  |2 22 
099 |a 005.8 ESS 
111 2 |a ESSoS (Symposium)  |n (1st :  |d 2009 :  |c Louvain, Belgium) 
245 1 0 |a Engineering secure software and systems :  |b First international symposium, ESSoS 2009, Leuven, Belgium, February 2009, proceedings /  |c Fabio Massacci, Samuel T. Redwine Jr., Nicola Zannone (eds.). 
264 1 |a Berlin :  |b Springer,  |c [2009] 
264 4 |c ©2009 
300 |a 1 online resource (x, 199 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 5429 
504 |a Includes bibliographical references and index. 
505 0 |a Policy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software -- Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results. 
520 |a This book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in Leuven, Belgium, in February 2009. The 10 revised full papers presented together with 7 industry reports and ideas papers were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance. 
588 |a Machine converted from AACR2 source record. 
588 0 |a Print version record. 
650 0 |a Computer security.  |9 327365 
650 0 |a Software engineering.  |9 352269 
650 0 |a Sensor networks  |v Congresses.  |9 767312 
655 7 |a Conference papers and proceedings.  |2 lcgft  |9 370308 
700 1 |a Massacci, Fabio,  |e author.  |9 889223 
700 1 |a Redwine, Samuel T.,  |e author.  |9 889986 
700 1 |a Zannone, Nicola,  |e author.  |9 889987 
776 0 8 |i Print version:  |a ESSoS 2009 (2009 : Leuven, Belgium).  |t Engineering secure software and systems.  |d Berlin : Springer, ©2009  |z 9783642001987  |z 364200198X  |w (OCoLC)310154102 
776 1 8 |w (OCoLC)646810439  |w (OCoLC)1060954767  |w (OCoLC)1087364062  |w (OCoLC)1097300303 
830 0 |a Lecture notes in computer science ;  |v 5429.  |9 291610 
856 4 0 |u https://ezproxy.aut.ac.nz/login?url=https://link.springer.com/10.1007/978-3-642-00199-4  |z Springer eBooks  |x TEMPORARY ERM URL 
942 |c EB  |n 0 
999 |c 1431907  |d 1431907 
Availability
Requests
Request this item Request this AUT item so you can pick it up when you're at the library.
Interlibrary Loan With Interlibrary Loan you can request the item from another library. It's a free service.