000 05440nam a22006615i 4500
001 978-3-540-37621-7
003 DE-He213
005 20240423125658.0
007 cr nn 008mamaa
008 121227s2004 gw | s |||| 0|eng d
020 _a9783540376217
_9978-3-540-37621-7
024 7 _a10.1007/b102118
_2doi
050 4 _aQA76.76.A65
072 7 _aUB
_2bicssc
072 7 _aCOM005000
_2bisacsh
072 7 _aUX
_2thema
082 0 4 _a005.3
_223
245 1 0 _aSoftware Security - Theories and Systems
_h[electronic resource] :
_bSecond Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 /
_cedited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki.
250 _a1st ed. 2004.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2004.
300 _aVIII, 352 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v3233
505 0 _a1: Analysis of Protocols and Cryptography -- Verifying Confidentiality and Authentication in Kerberos 5 -- A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack -- Formal Analysis of the NetBill Electronic Commerce Protocol -- Inferences on Honesty in Compositional Logic for Protocol Analysis -- A Formal System for Analysis of Cryptographic Encryption and Their Security Properties -- 2: Verification of Security Properties -- Formal Specification and Verification of Resource Bound Security Using PVS -- Java Program Verification at Nijmegen: Developments and Perspective -- Decision Procedures for Several Properties of Reactive System Specifications -- A Model for Delimited Information Release -- 3: Safe Implementation of Programming Languages -- The Interface Definition Language for Fail-Safe C -- Lightweight Wrappers for Interfacing with Binary Code in CCured -- 4: Secure Execution Environments -- Detecting Unknown Computer Viruses – A New Approach – -- Security Policy Descriptions Through the Use of Control Structure of a Target Program -- Securing RPC with a Reference Monitor for System Calls -- UML Scrapbook and Realization of Snapshot Programming Environment -- 5: Secure Systems and Security Management -- Managing Information Technology Security Risk -- SEAS: A Secure E-Voting Applet System -- The Design of a Secure Distributed Devices System Based on Immunity.
520 _aFollowing the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4–6, 2003. This volume is the collection of the papers that were presented at ISSS 2003. The proceedings of ISSS 2002 was published as LNCS 2609. Although the security and reliability of software systems for networked c- puter systems are major concerns of current society, the technology for software securitystillneedstobedevelopedinmanydirections.SimilartoISSS2002,ISSS 2003 aimed to provide a forum for research discussions and exchanges among world-leading scientists in the ?elds of both theoretical and systems aspects of security in software construction. The program of ISSS 2003 was a combination of invited talks and selected research contributions. It included the most recent visions and researches of the 9invitedspeakers,aswellas11contributionsofresearchesfundedbytheMEXT grant-in-aid for scienti?c research on the priority area “Implementation Scheme for Secure Computing” (AnZenKaken). We collected the original contributions after their presentation at the symposium and began a review procedure that resulted in the selection of the papers in this volume. They appear here in ?nal form. ISSS 2003 required a lot of work that was heavily dependent on members of the program committee, and sta?s and graduate students who participated in AnZenKaken. We sincerely thank them for their e?orts and time.
650 0 _aApplication software.
650 0 _aComputer networks .
650 0 _aOperating systems (Computers).
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aCompilers (Computer programs).
650 0 _aComputer science.
650 1 4 _aComputer and Information Systems Applications.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
650 2 4 _aCryptology.
650 2 4 _aCompilers and Interpreters.
650 2 4 _aTheory of Computation.
700 1 _aFutatsugi, Kokichi.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aMizoguchi, Fumio.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aYonezaki, Naoki.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540236351
776 0 8 _iPrinted edition:
_z9783662196137
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v3233
856 4 0 _uhttps://doi.org/10.1007/b102118
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c180569
_d180569