Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    b3kat_BV035439183
    Umfang: 1 Online-Ressource (X, 199 S.) , graph. Darst.
    ISBN: 9783642001987 , 9783642001994
    Serie: Lecture notes in computer science 5429
    Anmerkung: Literaturangaben
    Sprache: Englisch
    Schlagwort(e): Rechnernetz ; Computersicherheit ; Datensicherung ; Softwareentwicklung ; Anwendungssystem ; Kryptoanalyse ; Rechnernetz ; Zugriffskontrolle ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9947364170202882
    Umfang: X, 201 p. , online resource.
    ISBN: 9783642001994
    Serie: Lecture Notes in Computer Science, 5429
    Inhalt: This book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in Leuven, Belgium, in February 2009. The 10 revised full papers presented together with 7 industry reports and ideas papers were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance.
    Anmerkung: Policy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software – Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783642001987
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9949972414502882
    Umfang: X, 201 p. , online resource.
    Ausgabe: 1st ed. 2009.
    ISBN: 9783642001994
    Serie: Security and Cryptology, 5429
    Inhalt: This book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in Leuven, Belgium, in February 2009. The 10 revised full papers presented together with 7 industry reports and ideas papers were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance.
    Anmerkung: Policy Verification and Enforcement -- Verification of Business Process Entailment Constraints Using SPIN -- From Formal Access Control Policies to Runtime Enforcement Aspects -- Idea: Trusted Emergency Management -- Model Refinement and Program Transformation -- Idea: Action Refinement for Security Properties Enforcement -- Pattern-Based Confidentiality-Preserving Refinement -- Architectural Refinement and Notions of Intransitive Noninterference -- Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations -- Secure System Development -- Report: Measuring the Attack Surfaces of Enterprise Software -- Report: Extensibility and Implementation Independence of the .NET Cryptographic API -- Report: CC-Based Design of Secure Application Systems -- Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer -- Attack Analysis and Prevention -- Toward Non-security Failures as a Predictor of Security Faults and Failures -- A Scalable Approach to Full Attack Graphs Generation -- MEDS: The Memory Error Detection System -- Testing and Assurance -- Idea: Automatic Security Testing for Web Applications -- Report: Functional Security Testing Closing the Software - Security Testing Gap: A Case from a Telecom Provider -- Idea: Measuring the Effect of Code Complexity on Static Analysis Results.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783642001987
    Weitere Ausg.: Printed edition: ISBN 9783642002007
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783642001154?
Meinten Sie 9783642001314?
Meinten Sie 9783462001594?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz