Engineering Secure Software and Systems

Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings

  • Úlfar Erlingsson
  • Roel Wieringa
  • Nicola Zannone
Conference proceedings ESSoS 2011

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6542)

Table of contents

  1. Front Matter
  2. Session 1. Model-Based Security I

    1. Benjamin Aziz, Alvaro E. Arenas, Michael Wilson
      Pages 1-14
    2. David Power, Mark Slaymaker, Andrew Simpson
      Pages 15-28
    3. Wihem Arsac, Luca Compagna, Giancarlo Pellegrino, Serena Elisa Ponta
      Pages 29-42
  3. Session 2. Tools and Mechanisms

    1. Arnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl
      Pages 43-57
    2. Nataliia Bielova, Fabio Massacci
      Pages 73-86
  4. Session 3. Web Security

    1. Nick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns, Wouter Joosen
      Pages 87-100
  5. Session 4. Model-Based Security II

    1. Linda Ariani Gunawan, Frank Alexander Kraemer, Peter Herrmann
      Pages 142-155
  6. Session 5. Security Requirements Engineering

    1. Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu
      Pages 167-180
    2. Michael Felderer, Berthold Agreiter, Ruth Breu
      Pages 181-194
    3. Fabio Massacci, Stephan Neuhaus, Viet Hung Nguyen
      Pages 195-208
  7. Session 6. Authorization

    1. Steffen Bartsch
      Pages 209-220
    2. Tom Goovaerts, Lieven Desmet, Wouter Joosen
      Pages 221-233
  8. Session 7. Ideas

    1. Jing Xie, Bill Chu, Heather Richter Lipford
      Pages 248-255

About these proceedings

Introduction

This book constitutes the refereed proceedings of the Third International Symposium on Engineering Secure Software and Systems, ESSoS 2011, held in Madrid, Italy, in February 2011. The 18 revised full papers presented together with 3 idea papers were carefully reviewed and selected from 63 submissions. The papers are organized in topical sections on model-based security, tools and mechanisms, Web security, security requirements engineering, and authorization.

Keywords

access control attribute-based access control authentication model automatic security testing code refactoring collaborative virtual organizations control flow verification information security management multi-tier architecture risk assessment secure programming security engineering security validation service-oriented architectures session hijacking software engineering

Editors and affiliations

  • Úlfar Erlingsson
    • 1
  • Roel Wieringa
    • 2
  • Nicola Zannone
    • 3
  1. 1.Google Inc.Mountain ViewUSA
  2. 2.Computer Science DepartmentUniversity of TwenteEnschedeThe Netherlands
  3. 3.Faculty of Mathematics and Computer ScienceEindhoven University of TechnologyEindhovenThe Netherlands

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-19125-1
  • Copyright Information Springer Berlin Heidelberg 2011
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-19124-4
  • Online ISBN 978-3-642-19125-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book