Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV016548412
    Format: XI, 470 S.
    ISBN: 3-540-00708-3
    Series Statement: Lecture notes in computer science 2609
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Rechnernetz ; Personal Computer ; Personal Computer ; Softwareschutz ; Rechnernetz ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947920687002882
    Format: XII, 476 p. , online resource.
    ISBN: 9783540365327
    Series Statement: Lecture Notes in Computer Science, 2609
    Content: For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.
    Note: Security for Pervasive Computing -- Towards Security and Privacy for Pervasive Computing -- Security for Whom? The Shifting Security Assumptions of Pervasive Computing -- Active Authentication for Pervasive Computing Environments -- Security for P2P Systems and Autonomous Distributed Agents -- A Survey of Peer-to-Peer Security Issues -- Autonomous Nodes and Distributed Mechanisms -- Privacy Issues -- Privacy in Sensor Webs and Distributed Information Systems -- Negotiated Privacy -- Secure Software Circulation and Secure C Language -- SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation -- Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report -- Securing Programs by Rewriting and Sandboxing -- Types and Effects for Non-interfering Program Monitors -- Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains -- Enforcing Java Run-Time Properties Using Bytecode Rewriting -- Secure Mail System Construction -- AnZenMail: A Secure and Certified E-mail System -- Formalization and Verification of a Mail Server in Coq -- Some Security Systems -- Design and Implementation of Security System Based on Immune System -- Design and Implementation of Access Control System for Smart Office Environment -- Proof-Carrying Code and Type Systems for Security Protocols -- Typing One-to-One and One-to-Many Correspondences in Security Protocols -- Proof-Carrying Code with Untrusted Proof Rules -- Authentication Protocols -- Verification of Authentication Protocols Based on the Binding Relation -- Hiding Names: Private Authentication in the Applied Pi Calculus -- Environmental Requirements for Authentication Protocols -- Multiset Rewriting for Protocol Analysis -- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis -- Data Access Specification and the Most Powerful Symbolic Attacker in MSR -- Verification Methods and Tools -- A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic -- Formal Analysis of the iKP Electronic Payment Protocols -- CafeOBJ as a Tool for Behavioral System Verification.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540007081
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_744953804
    Format: Online-Ressource (XII, 476 p) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540365327 , 3540007083
    Series Statement: Lecture Notes in Computer Science 2609
    Content: For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well
    Note: Includes bibliographical references
    Additional Edition: ISBN 9783540007081
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662183113
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540007081
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Computersicherheit ; Rechnernetz ; Personal Computer ; Personal Computer ; Softwareschutz ; Rechnernetz ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948621095402882
    Format: XII, 476 p. , online resource.
    Edition: 1st ed. 2003.
    ISBN: 9783540365327
    Series Statement: Lecture Notes in Computer Science, 2609
    Content: For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.
    Note: Security for Pervasive Computing -- Towards Security and Privacy for Pervasive Computing -- Security for Whom? The Shifting Security Assumptions of Pervasive Computing -- Active Authentication for Pervasive Computing Environments -- Security for P2P Systems and Autonomous Distributed Agents -- A Survey of Peer-to-Peer Security Issues -- Autonomous Nodes and Distributed Mechanisms -- Privacy Issues -- Privacy in Sensor Webs and Distributed Information Systems -- Negotiated Privacy -- Secure Software Circulation and Secure C Language -- SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation -- Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report -- Securing Programs by Rewriting and Sandboxing -- Types and Effects for Non-interfering Program Monitors -- Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains -- Enforcing Java Run-Time Properties Using Bytecode Rewriting -- Secure Mail System Construction -- AnZenMail: A Secure and Certified E-mail System -- Formalization and Verification of a Mail Server in Coq -- Some Security Systems -- Design and Implementation of Security System Based on Immune System -- Design and Implementation of Access Control System for Smart Office Environment -- Proof-Carrying Code and Type Systems for Security Protocols -- Typing One-to-One and One-to-Many Correspondences in Security Protocols -- Proof-Carrying Code with Untrusted Proof Rules -- Authentication Protocols -- Verification of Authentication Protocols Based on the Binding Relation -- Hiding Names: Private Authentication in the Applied Pi Calculus -- Environmental Requirements for Authentication Protocols -- Multiset Rewriting for Protocol Analysis -- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis -- Data Access Specification and the Most Powerful Symbolic Attacker in MSR -- Verification Methods and Tools -- A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic -- Formal Analysis of the iKP Electronic Payment Protocols -- CafeOBJ as a Tool for Behavioral System Verification.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662183113
    Additional Edition: Printed edition: ISBN 9783540007081
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_1603886958
    Format: XI,470 S. , graph. Darst.
    ISBN: 3540007083
    Series Statement: Lecture notes in computer science 2609
    Note: Includes bibliographical references
    Additional Edition: Online-Ausg. Okada, Mitsuhiro Software Security -- Theories and Systems Berlin, Heidelberg : Springer Berlin Heidelberg, 2003 ISBN 9783540007081
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Softwaresystem ; Zuverlässigkeit ; Datensicherung ; Softwareschutz ; Ubiquitous Computing ; Authentifikation ; Zugriffskontrolle ; Datensicherung ; Kommunikationsprotokoll ; Datensicherung ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    kobvindex_ZLB13475734
    Format: XI, 470 Seiten , Ill., graph. Darst. , 24 cm
    ISBN: 3540007083 , 3540007083
    Series Statement: Lecture notes in computer science 2609
    Note: Literaturangaben , Text engl.
    Language: English
    Keywords: Softwaresystem ; Zuverlässigkeit ; Datensicherung ; Kongress ; Tokio 〈2002〉 ; Softwareschutz ; Kongress ; Tokio 〈2002〉 ; Ubiquitous Computing ; Authentifikation ; Zugriffskontrolle ; Datensicherung ; Kongress ; Tokio 〈2002〉 ; Kommunikationsprotokoll ; Datensicherung ; Kongress ; Tokio 〈2002〉 ; Kongress ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783540006084?
Did you mean 9783540005681?
Did you mean 9783540000051?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages