Engineering Secure Software and Systems : First International Symposium, ESSoS 2009 Leuven, Belgium, 2009 Proceedings (Lecture Notes in Computer Science) 〈Vol. 5429〉

個数:
  • ポイントキャンペーン

Engineering Secure Software and Systems : First International Symposium, ESSoS 2009 Leuven, Belgium, 2009 Proceedings (Lecture Notes in Computer Science) 〈Vol. 5429〉

  • ウェブストア価格 ¥11,845(本体¥10,769)
  • Springer(2009/02発売)
  • 外貨定価 US$ 54.99
  • 読書週間 ポイント2倍キャンペーン 対象商品(~11/9)
  • ポイント 214pt
  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 201 p.
  • 言語 ENG
  • 商品コード 9783642001987
  • DDC分類 004

Full Description

It is our pleasure to welcome you to the ?rst edition of the International S- posium on Engineering Secure Software and Systems. This unique events aims at bringing together researchers from Software - gineeringandSecurity Engineering,helping to unite and further developthe two communitiesinthisandfutureeditions.Theparalleltechnicalsponsorshipsfrom the ACM SIGSAC (the ACM interest group in security) and ACM SIGSOFT (the ACM interest groupin softwareengineering) and the IEEE TCSE is a clear sign of the importance of this inter-disciplinary research area and its potential. The di?culty of building secure software systems is no longer focused on mastering security technology such as cryptography or access control models. Other important, and less controllable, factors include the complexity of m- ern networked software systems, the unpredictability of practical development lifecycles, the intertwining of and trade-o? between functionality, security and other qualities, the di?culty of dealing with human factors, and so forth. Over the last few years, an entire research domain has been building up around these problems.
And although some battles have been won, the jury is still out on the ?nal verdict. The conference program included two major keynotes from Axel Van L- sweerde (U. Louvain) and Wolfram Schulte (Microsoft Research) and an int- esting blend of research, industry and idea papers.

Contents

Policy Verification and Enforcement.- Verification of Business Process Entailment Constraints Using SPIN.- From Formal Access Control Policies to Runtime Enforcement Aspects.- Idea: Trusted Emergency Management.- Model Refinement and Program Transformation.- Idea: Action Refinement for Security Properties Enforcement.- Pattern-Based Confidentiality-Preserving Refinement.- Architectural Refinement and Notions of Intransitive Noninterference.- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations.- Secure System Development.- Report: Measuring the Attack Surfaces of Enterprise Software.- Report: Extensibility and Implementation Independence of the .NET Cryptographic API.- Report: CC-Based Design of Secure Application Systems.- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer.- Attack Analysis and Prevention.- Toward Non-security Failures as a Predictor of Security Faults and Failures.- A Scalable Approach to Full Attack Graphs Generation.- MEDS: The Memory Error Detection System.- Testing and Assurance.- Idea: Automatic Security Testing for Web Applications.- Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider.- Idea: Measuring the Effect of Code Complexity on Static Analysis Results.

最近チェックした商品