What is included with this book?
Model-Based Security I | |
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations | p. 1 |
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy | p. 15 |
Security Validation of Business Processes via Model-Checking | p. 29 |
Tools and Mechanisms | |
On-Device Control Flow Verification for Java Programs | p. 43 |
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations | p. 58 |
Predictability of Enforcement | p. 73 |
Web Security | |
SessionShield: Lightweight Protection against Session Hijacking | p. 87 |
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications | p. 101 |
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications | p. 114 |
Model-Based Security II | |
Lightweight Modeling and Analysis of Security Concepts | p. 128 |
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications | p. 142 |
An Architecture-Centric Approach to Detecting Security Patterns in software | p. 156 |
Security Requirements Engineering | |
The Security Twin Peaks | p. 167 |
Evolution of Security Requirements Tests for Service-Centric Systems | p. 181 |
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes | p. 195 |
Authorization | |
Authorization Enforcement Usability Case Study | p. 209 |
Scalable Authorization Middleware for Service Oriented Architectures | p. 221 |
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models | p. 234 |
Ideas | |
Idea: Interactive Support for Secure Software Development | p. 248 |
Idea: A Reference Platform for Systematic Information Security Management Tool Support | p. 256 |
Idea: Simulation Based Security Requirement Verification for Transaction Level Models | p. 264 |
Author Index | p. 273 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.