Software Security - Theories and Systems Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 /

Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4-6, 2003. This volume is the collection of the papers that were presented at ISSS 2...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Futatsugi, Kokichi (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Mizoguchi, Fumio (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Yonezaki, Naoki (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2004.
Έκδοση:1st ed. 2004.
Σειρά:Lecture Notes in Computer Science, 3233
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05731nam a2200613 4500
001 978-3-540-37621-7
003 DE-He213
005 20191026231032.0
007 cr nn 008mamaa
008 121227s2004 gw | s |||| 0|eng d
020 |a 9783540376217  |9 978-3-540-37621-7 
024 7 |a 10.1007/b102118  |2 doi 
040 |d GrThAP 
050 4 |a QA76.76.A65 
072 7 |a UB  |2 bicssc 
072 7 |a COM018000  |2 bisacsh 
072 7 |a UB  |2 thema 
082 0 4 |a 004  |2 23 
245 1 0 |a Software Security - Theories and Systems  |h [electronic resource] :  |b Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 /  |c edited by Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki. 
250 |a 1st ed. 2004. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2004. 
300 |a VIII, 352 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 3233 
505 0 |a 1: Analysis of Protocols and Cryptography -- Verifying Confidentiality and Authentication in Kerberos 5 -- A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack -- Formal Analysis of the NetBill Electronic Commerce Protocol -- Inferences on Honesty in Compositional Logic for Protocol Analysis -- A Formal System for Analysis of Cryptographic Encryption and Their Security Properties -- 2: Verification of Security Properties -- Formal Specification and Verification of Resource Bound Security Using PVS -- Java Program Verification at Nijmegen: Developments and Perspective -- Decision Procedures for Several Properties of Reactive System Specifications -- A Model for Delimited Information Release -- 3: Safe Implementation of Programming Languages -- The Interface Definition Language for Fail-Safe C -- Lightweight Wrappers for Interfacing with Binary Code in CCured -- 4: Secure Execution Environments -- Detecting Unknown Computer Viruses - A New Approach - -- Security Policy Descriptions Through the Use of Control Structure of a Target Program -- Securing RPC with a Reference Monitor for System Calls -- UML Scrapbook and Realization of Snapshot Programming Environment -- 5: Secure Systems and Security Management -- Managing Information Technology Security Risk -- SEAS: A Secure E-Voting Applet System -- The Design of a Secure Distributed Devices System Based on Immunity. 
520 |a Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4-6, 2003. This volume is the collection of the papers that were presented at ISSS 2003. The proceedings of ISSS 2002 was published as LNCS 2609. Although the security and reliability of software systems for networked c- puter systems are major concerns of current society, the technology for software securitystillneedstobedevelopedinmanydirections.SimilartoISSS2002,ISSS 2003 aimed to provide a forum for research discussions and exchanges among world-leading scientists in the ?elds of both theoretical and systems aspects of security in software construction. The program of ISSS 2003 was a combination of invited talks and selected research contributions. It included the most recent visions and researches of the 9invitedspeakers,aswellas11contributionsofresearchesfundedbytheMEXT grant-in-aid for scienti?c research on the priority area "Implementation Scheme for Secure Computing" (AnZenKaken). We collected the original contributions after their presentation at the symposium and began a review procedure that resulted in the selection of the papers in this volume. They appear here in ?nal form. ISSS 2003 required a lot of work that was heavily dependent on members of the program committee, and sta?s and graduate students who participated in AnZenKaken. We sincerely thank them for their e?orts and time. 
650 0 |a Application software. 
650 0 |a Computer communication systems. 
650 0 |a Operating systems (Computers). 
650 0 |a Data encryption (Computer science). 
650 0 |a Programming languages (Electronic computers). 
650 0 |a Computers. 
650 1 4 |a Computer Applications.  |0 http://scigraph.springernature.com/things/product-market-codes/I23001 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Programming Languages, Compilers, Interpreters.  |0 http://scigraph.springernature.com/things/product-market-codes/I14037 
650 2 4 |a Theory of Computation.  |0 http://scigraph.springernature.com/things/product-market-codes/I16005 
700 1 |a Futatsugi, Kokichi.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Mizoguchi, Fumio.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Yonezaki, Naoki.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783540236351 
776 0 8 |i Printed edition:  |z 9783662196137 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 3233 
856 4 0 |u https://doi.org/10.1007/b102118  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)