000 05667nam a22007095i 4500
001 978-3-540-36532-7
003 DE-He213
005 20240423132438.0
007 cr nn 008mamaa
008 121227s2003 gw | s |||| 0|eng d
020 _a9783540365327
_9978-3-540-36532-7
024 7 _a10.1007/3-540-36532-X
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aSoftware Security -- Theories and Systems
_h[electronic resource] :
_bMext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers /
_cedited by Mitsuhiro Okada, Benjamin Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa.
250 _a1st ed. 2003.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2003.
300 _aXII, 476 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2609
505 0 _aSecurity for Pervasive Computing -- Towards Security and Privacy for Pervasive Computing -- Security for Whom? The Shifting Security Assumptions of Pervasive Computing -- Active Authentication for Pervasive Computing Environments -- Security for P2P Systems and Autonomous Distributed Agents -- A Survey of Peer-to-Peer Security Issues -- Autonomous Nodes and Distributed Mechanisms -- Privacy Issues -- Privacy in Sensor Webs and Distributed Information Systems -- Negotiated Privacy -- Secure Software Circulation and Secure C Language -- SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation -- Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report -- Securing Programs by Rewriting and Sandboxing -- Types and Effects for Non-interfering Program Monitors -- Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains -- Enforcing Java Run-Time Properties Using Bytecode Rewriting -- Secure Mail System Construction -- AnZenMail: A Secureand Certified E-mail System -- Formalization and Verification of a Mail Server in Coq -- Some Security Systems -- Design and Implementation of Security System Based on Immune System -- Design and Implementation of Access Control System for Smart Office Environment -- Proof-Carrying Code and Type Systems for Security Protocols -- Typing One-to-One and One-to-Many Correspondences in Security Protocols -- Proof-Carrying Code with Untrusted Proof Rules -- Authentication Protocols -- Verification of Authentication Protocols Based on the Binding Relation -- Hiding Names: Private Authentication in the Applied Pi Calculus -- Environmental Requirements for Authentication Protocols -- Multiset Rewriting for Protocol Analysis -- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis -- Data Access Specification and the Most Powerful Symbolic Attacker in MSR -- Verification Methods and Tools -- A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic -- Formal Analysis of the iKP Electronic Payment Protocols -- CafeOBJ as a Tool for Behavioral System Verification.
520 _aFor more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aOperating systems (Computers).
650 0 _aComputer networks .
650 0 _aCompilers (Computer programs).
650 0 _aComputer science.
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aCryptology.
650 2 4 _aOperating Systems.
650 2 4 _aComputer Communication Networks.
650 2 4 _aCompilers and Interpreters.
650 2 4 _aComputer Science Logic and Foundations of Programming.
650 2 4 _aIT Operations.
700 1 _aOkada, Mitsuhiro.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aPierce, Benjamin.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aScedrov, Andre.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aTokuda, Hideyuki.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aYonezawa, Akinori.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540007081
776 0 8 _iPrinted edition:
_z9783662183113
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2609
856 4 0 _uhttps://doi.org/10.1007/3-540-36532-X
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c187837
_d187837