Skip to main content
  • Conference proceedings
  • © 2004

Software Security - Theories and Systems

Second Mext-WSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3233)

Conference series link(s): ISSS: International Symposium on Software Security

Conference proceedings info: ISSS 2003.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (18 papers)

  1. Front Matter

  2. Part 1: Analysis of Protocols and Cryptography

    1. Verifying Confidentiality and Authentication in Kerberos 5

      • Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov
      Pages 1-24
    2. A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack

      • Daigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda
      Pages 25-44
    3. Formal Analysis of the NetBill Electronic Commerce Protocol

      • Kazuhiro Ogata, Kokichi Futatsugi
      Pages 45-64
    4. A Formal System for Analysis of Cryptographic Encryption and Their Security Properties

      • Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki
      Pages 87-112
  3. Part 2: Verification of Security Properties

    1. A Model for Delimited Information Release

      • Andrei Sabelfeld, Andrew C. Myers
      Pages 174-191
  4. Part 3: Safe Implementation of Programming Languages

    1. The Interface Definition Language for Fail-Safe C

      • Kohei Suenaga, Yutaka Oiwa, Eijiro Sumii, Akinori Yonezawa
      Pages 192-208
    2. Lightweight Wrappers for Interfacing with Binary Code in CCured

      • Matthew Harren, George C. Necula
      Pages 209-225
  5. Part 4: Secure Execution Environments

    1. Securing RPC with a Reference Monitor for System Calls

      • Yasushi Shinjo, Yoshinori Nakata, Kozo Itano
      Pages 262-280
    2. UML Scrapbook and Realization of Snapshot Programming Environment

      • Osamu Sato, Richard Potter, Mitsuharu Yamamoto, Masami Hagiya
      Pages 281-295
  6. Part 5: Secure Systems and Security Management

    1. Managing Information Technology Security Risk

      • David P. Gilliam
      Pages 296-317
    2. SEAS: A Secure E-Voting Applet System

      • Fabrizio Baiardi, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
      Pages 318-329
    3. The Design of a Secure Distributed Devices System Based on Immunity

      • Hiroyuki Nishiyama, Yukinobu Mine, Fumio Mizoguchi
      Pages 330-344
  7. Back Matter

Other Volumes

  1. Software Security - Theories and Systems

About this book

Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4–6, 2003. This volume is the collection of the papers that were presented at ISSS 2003. The proceedings of ISSS 2002 was published as LNCS 2609. Although the security and reliability of software systems for networked c- puter systems are major concerns of current society, the technology for software securitystillneedstobedevelopedinmanydirections.SimilartoISSS2002,ISSS 2003 aimed to provide a forum for research discussions and exchanges among world-leading scientists in the ?elds of both theoretical and systems aspects of security in software construction. The program of ISSS 2003 was a combination of invited talks and selected research contributions. It included the most recent visions and researches of the 9invitedspeakers,aswellas11contributionsofresearchesfundedbytheMEXT grant-in-aid for scienti?c research on the priority area “Implementation Scheme for Secure Computing” (AnZenKaken). We collected the original contributions after their presentation at the symposium and began a review procedure that resulted in the selection of the papers in this volume. They appear here in ?nal form. ISSS 2003 required a lot of work that was heavily dependent on members of the program committee, and sta?s and graduate students who participated in AnZenKaken. We sincerely thank them for their e?orts and time.

Keywords

  • Code
  • Information
  • Monitor
  • authentication
  • cryptographic protocols
  • data security
  • dependable computing
  • formal specification
  • information security
  • logic
  • reliable systems
  • security
  • security protocols
  • software security
  • systems security

Editors and Affiliations

  • Japan Advanced Institute of Science and Technology, (JAIST),  

    Kokichi Futatsugi

  • Faculty of Science and Technology, Tokyo University of Science, Chiba, Japan

    Fumio Mizoguchi

  • Tokyo Institute of Technology,  

    Naoki Yonezaki

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions