Engineering Secure Software and Systems

Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings

Editors:

ISBN: 978-3-642-19124-4 (Print) 978-3-642-19125-1 (Online)

Table of contents (21 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Session 1. Model-Based Security I

    1. No Access

      Book Chapter

      Pages 1-14

      Model-Based Refinement of Security Policies in Collaborative Virtual Organisations

    2. No Access

      Book Chapter

      Pages 15-28

      Automatic Conformance Checking of Role-Based Access Control Policies via Alloy

    3. No Access

      Book Chapter

      Pages 29-42

      Security Validation of Business Processes via Model-Checking

  3. Session 2. Tools and Mechanisms

    1. No Access

      Book Chapter

      Pages 43-57

      On-Device Control Flow Verification for Java Programs

    2. No Access

      Book Chapter

      Pages 58-72

      Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations

    3. No Access

      Book Chapter

      Pages 73-86

      Predictability of Enforcement

  4. Session 3. Web Security

    1. No Access

      Book Chapter

      Pages 87-100

      SessionShield: Lightweight Protection against Session Hijacking

    2. No Access

      Book Chapter

      Pages 101-113

      Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications

    3. No Access

      Book Chapter

      Pages 114-127

      Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications

  5. Session 4. Model-Based Security II

    1. No Access

      Book Chapter

      Pages 128-141

      Lightweight Modeling and Analysis of Security Concepts

    2. No Access

      Book Chapter

      Pages 142-155

      A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications

    3. No Access

      Book Chapter

      Pages 156-166

      An Architecture-Centric Approach to Detecting Security Patterns in Software

  6. Session 5. Security Requirements Engineering

    1. No Access

      Book Chapter

      Pages 167-180

      The Security Twin Peaks

    2. No Access

      Book Chapter

      Pages 181-194

      Evolution of Security Requirements Tests for Service–Centric Systems

    3. No Access

      Book Chapter

      Pages 195-208

      After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes

  7. Session 6. Authorization

    1. No Access

      Book Chapter

      Pages 209-220

      Authorization Enforcement Usability Case Study

    2. No Access

      Book Chapter

      Pages 221-233

      Scalable Authorization Middleware for Service Oriented Architectures

    3. No Access

      Book Chapter

      Pages 234-247

      Adaptable Authentication Model: Exploring Security with Weaker Attacker Models

  8. Session 7. Ideas

    1. No Access

      Book Chapter

      Pages 248-255

      Idea: Interactive Support for Secure Software Development

    2. No Access

      Book Chapter

      Pages 256-263

      Idea: A Reference Platform for Systematic Information Security Management Tool Support

  9. Back Matter

    Pages -

previous Page of 2