Jump to ratings and reviews
Rate this book

Engineering Secure Software and Systems: 6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings

Rate this book
Model-Based Security.- Detecting Code Reuse Attacks with a Model of Conformant Program Execution.- Security@Runtime : A Flexible MDE Approach to Enforce Fine-Grained Security Policies.- Towards a Vision of Engineering Controlled Interaction Execution for Information Services.- Formal Methods.- Automated Formal Verification of Application-Specific Security Properties .- Fault-Tolerant Non-interference .- Quantitative Security Analysis for Programs with Low Input and Noisy Output.- A Modeling and Formal Approach for the Precise Specification of Security Patterns.- On the Relation between Redactable and Sanitizable Signature Schemes.- Towards a Working Fully Homomorphic Practice and the Secret Computer.- Web and Mobile Security.- Architectures for Inlining Security Monitors in Web Applications.- Automatic and Robust Client-Side Protection for Cookie-Based Sessions.- Security Testing of GSM Implementations.- Applications.- User-Centric Security Assessment of Software A Case Study.- Security Engineering Principles for Day Two Car2X Applications .- Embedded Fault Injection Simulator on Smartcard.

252 pages, Paperback

First published February 13, 2013

About the author

Jan Jürjens

8 books

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
0 (0%)
4 stars
0 (0%)
3 stars
0 (0%)
2 stars
0 (0%)
1 star
0 (0%)
No one has reviewed this book yet.

Can't find what you're looking for?

Get help and learn more about the design.