Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : ISSS 2002 (2002 ; Tokyo, Japan)
Titre(s) : Software security [Texte électronique] : theories and systems : Mext-NSF-JSPS international symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002 : revised papers / Mitsuhiro Okada [and others]
Publication : Berlin ; New York : Springer, cop. 2003
Description matérielle : 1 online resource (xi, 470 pages)
Collection : Lecture notes in computer science ; 2609
Note(s) : Includes bibliographical references and index
For more than the last three decades, the security of software systems has been an
important area of computer science, yet it is a rather recent general recognition
that technologies for software security are highly needed. This book assesses the
state of the art in software and systems security by presenting a carefully arranged
selection of revised invited and reviewed papers. It covers basic aspects and recently
developed topics such as security of pervasive computing, peer-to-peer systems and
autonomous distributed agents, secure software circulation, compilers for fail-safe
C language, construction of secure mail systems, type systems and multiset rewriting
systems for security protocols, and privacy issues as well
Autre(s) auteur(s) : Okada, Mitsuhiro (1954-....). Fonction indéterminée
Japan. Monbushō. Fonction indéterminée
National Science Foundation U.S.. Fonction indéterminée
Japan society for the promotion of science. Fonction indéterminée
Sujet(s) : Informatique
Langages de programmation
Systèmes d'exploitation (ordinateurs)
Systèmes informatiques -- Mesures de sûreté
Chiffrement (informatique)
Réseaux d'ordinateurs
Indice(s) Dewey :
005.8 (23e éd.) = Sécurité informatique
Identifiants, prix et caractéristiques : ISBN 9783540365327
Identifiant de la notice : ark:/12148/cb446875730
Notice n° :
FRBNF44687573
(notice reprise d'un réservoir extérieur)
Table des matières : Security for Pervasive Computing ; Towards Security and Privacy for Pervasive Computing
; Security for Whom? The Shifting Security Assumptions of Pervasive Computing ;
Active Authentication for Pervasive Computing Environments ; Security for P2P Systems
and Autonomous Distributed Agents ; A Survey of Peer-to-Peer Security Issues ; Autonomous
Nodes and Distributed Mechanisms ; Privacy Issues ; Privacy in Sensor Webs and Distributed
Information Systems ; Negotiated Privacy ; Secure Software Circulation and Secure
C Language ; SoftwarePot: An Encapsulated Transferable File System for Secure Software
Circulation ; Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure
Progress Report ; Securing Programs by Rewriting and Sandboxing ; Types and Effects
for Non-interfering Program Monitors ; Flexible and Efficient Sandboxing Based on
Fine-Grained Protection Domains ; Enforcing Java Run-Time Properties Using Bytecode
Rewriting ; Secure Mail System Construction ;