did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783642191244

Third International Symposium, Essos 2011, Madrid, Spain, February 9-10, 2011: Lecture Notes in Computer Science & Security and Cryptology

by ; ;
  • ISBN13:

    9783642191244

  • ISBN10:

    364219124X

  • Format: Paperback
  • Copyright: 2011-03-21
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
List Price: $89.99 Save up to $71.43
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the Third International Symposium on Engineering Secure Software and Systems, ESSoS 2011, held in Madrid, Italy, in February 2011. The 18 revised full papers presented together with 3 idea papers were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on model-based security, tools and mechanisms, Web security, security requirements engineering, and authorization.

Table of Contents

Model-Based Security I
Model-Based Refinement of Security Policies in Collaborative Virtual Organisationsp. 1
Automatic Conformance Checking of Role-Based Access Control Policies via Alloyp. 15
Security Validation of Business Processes via Model-Checkingp. 29
Tools and Mechanisms
On-Device Control Flow Verification for Java Programsp. 43
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementationsp. 58
Predictability of Enforcementp. 73
Web Security
SessionShield: Lightweight Protection against Session Hijackingp. 87
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applicationsp. 101
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applicationsp. 114
Model-Based Security II
Lightweight Modeling and Analysis of Security Conceptsp. 128
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applicationsp. 142
An Architecture-Centric Approach to Detecting Security Patterns in softwarep. 156
Security Requirements Engineering
The Security Twin Peaksp. 167
Evolution of Security Requirements Tests for Service-Centric Systemsp. 181
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixesp. 195
Authorization
Authorization Enforcement Usability Case Studyp. 209
Scalable Authorization Middleware for Service Oriented Architecturesp. 221
Adaptable Authentication Model: Exploring Security with Weaker Attacker Modelsp. 234
Ideas
Idea: Interactive Support for Secure Software Developmentp. 248
Idea: A Reference Platform for Systematic Information Security Management Tool Supportp. 256
Idea: Simulation Based Security Requirement Verification for Transaction Level Modelsp. 264
Author Indexp. 273
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program