Software Security — Theories and Systems [electronic resource] : Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers /

For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.

Saved in:
Bibliographic Details
Main Authors: Okada, Mitsuhiro. editor., Pierce, Benjamin C. editor., Scedrov, Andre. editor., Tokuda, Hideyuki. editor., Yonezawa, Akinori. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003
Subjects:Computer science., Computer communication systems., Programming languages (Electronic computers)., Operating systems (Computers)., Data encryption (Computer science)., Computer logic., Management information systems., Computer Science., Data Encryption., Operating Systems., Computer Communication Networks., Programming Languages, Compilers, Interpreters., Logics and Meanings of Programs., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/3-540-36532-X
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:227157
record_format koha
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Programming languages (Electronic computers).
Operating systems (Computers).
Data encryption (Computer science).
Computer logic.
Management information systems.
Computer Science.
Data Encryption.
Operating Systems.
Computer Communication Networks.
Programming Languages, Compilers, Interpreters.
Logics and Meanings of Programs.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Programming languages (Electronic computers).
Operating systems (Computers).
Data encryption (Computer science).
Computer logic.
Management information systems.
Computer Science.
Data Encryption.
Operating Systems.
Computer Communication Networks.
Programming Languages, Compilers, Interpreters.
Logics and Meanings of Programs.
Management of Computing and Information Systems.
spellingShingle Computer science.
Computer communication systems.
Programming languages (Electronic computers).
Operating systems (Computers).
Data encryption (Computer science).
Computer logic.
Management information systems.
Computer Science.
Data Encryption.
Operating Systems.
Computer Communication Networks.
Programming Languages, Compilers, Interpreters.
Logics and Meanings of Programs.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Programming languages (Electronic computers).
Operating systems (Computers).
Data encryption (Computer science).
Computer logic.
Management information systems.
Computer Science.
Data Encryption.
Operating Systems.
Computer Communication Networks.
Programming Languages, Compilers, Interpreters.
Logics and Meanings of Programs.
Management of Computing and Information Systems.
Okada, Mitsuhiro. editor.
Pierce, Benjamin C. editor.
Scedrov, Andre. editor.
Tokuda, Hideyuki. editor.
Yonezawa, Akinori. editor.
SpringerLink (Online service)
Software Security — Theories and Systems [electronic resource] : Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers /
description For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.
format Texto
topic_facet Computer science.
Computer communication systems.
Programming languages (Electronic computers).
Operating systems (Computers).
Data encryption (Computer science).
Computer logic.
Management information systems.
Computer Science.
Data Encryption.
Operating Systems.
Computer Communication Networks.
Programming Languages, Compilers, Interpreters.
Logics and Meanings of Programs.
Management of Computing and Information Systems.
author Okada, Mitsuhiro. editor.
Pierce, Benjamin C. editor.
Scedrov, Andre. editor.
Tokuda, Hideyuki. editor.
Yonezawa, Akinori. editor.
SpringerLink (Online service)
author_facet Okada, Mitsuhiro. editor.
Pierce, Benjamin C. editor.
Scedrov, Andre. editor.
Tokuda, Hideyuki. editor.
Yonezawa, Akinori. editor.
SpringerLink (Online service)
author_sort Okada, Mitsuhiro. editor.
title Software Security — Theories and Systems [electronic resource] : Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers /
title_short Software Security — Theories and Systems [electronic resource] : Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers /
title_full Software Security — Theories and Systems [electronic resource] : Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers /
title_fullStr Software Security — Theories and Systems [electronic resource] : Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers /
title_full_unstemmed Software Security — Theories and Systems [electronic resource] : Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers /
title_sort software security — theories and systems [electronic resource] : mext-nsf-jsps international symposium, isss 2002 tokyo, japan, november 8–10, 2002 revised papers /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2003
url http://dx.doi.org/10.1007/3-540-36532-X
work_keys_str_mv AT okadamitsuhiroeditor softwaresecuritytheoriesandsystemselectronicresourcemextnsfjspsinternationalsymposiumisss2002tokyojapannovember8102002revisedpapers
AT piercebenjaminceditor softwaresecuritytheoriesandsystemselectronicresourcemextnsfjspsinternationalsymposiumisss2002tokyojapannovember8102002revisedpapers
AT scedrovandreeditor softwaresecuritytheoriesandsystemselectronicresourcemextnsfjspsinternationalsymposiumisss2002tokyojapannovember8102002revisedpapers
AT tokudahideyukieditor softwaresecuritytheoriesandsystemselectronicresourcemextnsfjspsinternationalsymposiumisss2002tokyojapannovember8102002revisedpapers
AT yonezawaakinorieditor softwaresecuritytheoriesandsystemselectronicresourcemextnsfjspsinternationalsymposiumisss2002tokyojapannovember8102002revisedpapers
AT springerlinkonlineservice softwaresecuritytheoriesandsystemselectronicresourcemextnsfjspsinternationalsymposiumisss2002tokyojapannovember8102002revisedpapers
_version_ 1756271082174676992
spelling KOHA-OAI-TEST:2271572018-07-31T00:08:17ZSoftware Security — Theories and Systems [electronic resource] : Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers / Okada, Mitsuhiro. editor. Pierce, Benjamin C. editor. Scedrov, Andre. editor. Tokuda, Hideyuki. editor. Yonezawa, Akinori. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2003.engFor more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.Security for Pervasive Computing -- Towards Security and Privacy for Pervasive Computing -- Security for Whom? The Shifting Security Assumptions of Pervasive Computing -- Active Authentication for Pervasive Computing Environments -- Security for P2P Systems and Autonomous Distributed Agents -- A Survey of Peer-to-Peer Security Issues -- Autonomous Nodes and Distributed Mechanisms -- Privacy Issues -- Privacy in Sensor Webs and Distributed Information Systems -- Negotiated Privacy -- Secure Software Circulation and Secure C Language -- SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation -- Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report -- Securing Programs by Rewriting and Sandboxing -- Types and Effects for Non-interfering Program Monitors -- Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains -- Enforcing Java Run-Time Properties Using Bytecode Rewriting -- Secure Mail System Construction -- AnZenMail: A Secure and Certified E-mail System -- Formalization and Verification of a Mail Server in Coq -- Some Security Systems -- Design and Implementation of Security System Based on Immune System -- Design and Implementation of Access Control System for Smart Office Environment -- Proof-Carrying Code and Type Systems for Security Protocols -- Typing One-to-One and One-to-Many Correspondences in Security Protocols -- Proof-Carrying Code with Untrusted Proof Rules -- Authentication Protocols -- Verification of Authentication Protocols Based on the Binding Relation -- Hiding Names: Private Authentication in the Applied Pi Calculus -- Environmental Requirements for Authentication Protocols -- Multiset Rewriting for Protocol Analysis -- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis -- Data Access Specification and the Most Powerful Symbolic Attacker in MSR -- Verification Methods and Tools -- A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic -- Formal Analysis of the iKP Electronic Payment Protocols -- CafeOBJ as a Tool for Behavioral System Verification.For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.Computer science.Computer communication systems.Programming languages (Electronic computers).Operating systems (Computers).Data encryption (Computer science).Computer logic.Management information systems.Computer Science.Data Encryption.Operating Systems.Computer Communication Networks.Programming Languages, Compilers, Interpreters.Logics and Meanings of Programs.Management of Computing and Information Systems.Springer eBookshttp://dx.doi.org/10.1007/3-540-36532-XURN:ISBN:9783540365327