Engineering Secure Software and Systems

5th International Symposium, ESSoS 2013, Paris, France, February 27 - March 1, 2013. Proceedings

  • Jan Jürjens
  • Benjamin Livshits
  • Riccardo Scandariato
Conference proceedings ESSoS 2013
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7781)

Table of contents

  1. Front Matter
  2. Secure Programming

    1. Bastian Braun, Patrick Gemein, Hans P. Reiser, Joachim Posegga
      Pages 1-16
    2. Nirupama Talele, Jason Teutsch, Trent Jaeger, Robert F. Erbacher
      Pages 17-32
    3. Philipp von Styp-Rekowsky, Sebastian Gerling, Michael Backes, Christian Hammer
      Pages 33-41
  3. Policies

    1. Michael J. May, Karthikeyan Bhargavan
      Pages 42-57
    2. Prachi Kumari, Alexander Pretschner
      Pages 58-74
    3. Linda Ariani Gunawan, Peter Herrmann
      Pages 75-90
  4. Proving

    1. Denis Butin, David Gray, Giampaolo Bella
      Pages 91-106
    2. Tri Minh Ngo, Mariëlle Stoelinga, Marieke Huisman
      Pages 107-122
    3. Peter T. Breuer, Jonathan P. Bowen
      Pages 123-138
  5. Formal Methods

    1. Jean-Baptiste Jeannin, Guido de Caso, Juan Chen, Yuri Gurevich, Prasad Naldurg, Nikhil Swamy
      Pages 139-154
    2. Koen Decroix, Jorn Lapon, Bart De Decker, Vincent Naessens
      Pages 155-170
    3. Myla M. Archer, Elizabeth I. Leonard, Constance L. Heitmeyer
      Pages 171-180
  6. Analyzing

    1. Vadim Kotov, Fabio Massacci
      Pages 181-196
    2. Anne Edmundson, Brian Holtkamp, Emanuel Rivera, Matthew Finifter, Adrian Mettler, David Wagner
      Pages 197-212
    3. Peter T. Breuer, Jonathan P. Bowen
      Pages E1-E1
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.

Keywords

authorization protocols privacy program verification security policies security-critical systems

Editors and affiliations

  • Jan Jürjens
    • 1
  • Benjamin Livshits
    • 2
  • Riccardo Scandariato
    • 3
  1. 1.Department of Computer ScienceTU Dortmund und Fraunhofer ISSTDortmundGermany
  2. 2.One Microsoft WayMicrosoft ResearchRedmondUSA
  3. 3.Department of Computer ScienceKatholieke Universiteit LeuvenHeverleeBelgium

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-36563-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2013
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-36562-1
  • Online ISBN 978-3-642-36563-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book