Software Security -- Theories and Systems Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers

For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by...

Full description

Bibliographic Details
Other Authors: Okada, Mitsuhiro (Editor), Pierce, Benjamin (Editor), Scedrov, Andre (Editor), Tokuda, Hideyuki (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2003, 2003
Edition:1st ed. 2003
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 04603nmm a2200469 u 4500
001 EB000653351
003 EBX01000000000000000506433
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783540365327 
100 1 |a Okada, Mitsuhiro  |e [editor] 
245 0 0 |a Software Security -- Theories and Systems  |h Elektronische Ressource  |b Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers  |c edited by Mitsuhiro Okada, Benjamin Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa 
250 |a 1st ed. 2003 
260 |a Berlin, Heidelberg  |b Springer Berlin Heidelberg  |c 2003, 2003 
300 |a XII, 476 p  |b online resource 
505 0 |a Security for Pervasive Computing -- Towards Security and Privacy for Pervasive Computing -- Security for Whom? The Shifting Security Assumptions of Pervasive Computing -- Active Authentication for Pervasive Computing Environments -- Security for P2P Systems and Autonomous Distributed Agents -- A Survey of Peer-to-Peer Security Issues -- Autonomous Nodes and Distributed Mechanisms -- Privacy Issues -- Privacy in Sensor Webs and Distributed Information Systems -- Negotiated Privacy -- Secure Software Circulation and Secure C Language -- SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation -- Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report -- Securing Programs by Rewriting and Sandboxing -- Types and Effects for Non-interfering Program Monitors -- Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains -- Enforcing Java Run-Time Properties Using Bytecode Rewriting --  
505 0 |a Secure Mail System Construction -- AnZenMail: A Secureand Certified E-mail System -- Formalization and Verification of a Mail Server in Coq -- Some Security Systems -- Design and Implementation of Security System Based on Immune System -- Design and Implementation of Access Control System for Smart Office Environment -- Proof-Carrying Code and Type Systems for Security Protocols -- Typing One-to-One and One-to-Many Correspondences in Security Protocols -- Proof-Carrying Code with Untrusted Proof Rules -- Authentication Protocols -- Verification of Authentication Protocols Based on the Binding Relation -- Hiding Names: Private Authentication in the Applied Pi Calculus -- Environmental Requirements for Authentication Protocols -- Multiset Rewriting for Protocol Analysis -- A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis -- Data Access Specification and the Most Powerful Symbolic Attacker in MSR -- Verification Methods and Tools --  
505 0 |a A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic -- Formal Analysis of the iKP Electronic Payment Protocols -- CafeOBJ as a Tool for Behavioral System Verification 
653 |a Computer Communication Networks 
653 |a Compilers (Computer programs) 
653 |a Computer Science Logic and Foundations of Programming 
653 |a Compilers and Interpreters 
653 |a Operating Systems 
653 |a Computer science 
653 |a Operating systems (Computers) 
653 |a Cryptography 
653 |a Electronic data processing / Management 
653 |a Computer networks  
653 |a Data encryption (Computer science) 
653 |a Cryptology 
653 |a IT Operations 
700 1 |a Pierce, Benjamin  |e [editor] 
700 1 |a Scedrov, Andre  |e [editor] 
700 1 |a Tokuda, Hideyuki  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Lecture Notes in Computer Science 
028 5 0 |a 10.1007/3-540-36532-X 
856 4 0 |u https://doi.org/10.1007/3-540-36532-X?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824 
520 |a For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed. This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well