Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This book constitutes the refereed proceedings of the First International Symposium on Engineering Secure Software and Systems, ESSoS 2009, held in Leuven, Belgium, in February 2009. The 10 revised full papers presented together with 7 industry reports and ideas papers were carefully reviewed and selected from 57 submissions. The papers are organized in topical sections on policy verification and enforcement, model refinement and program transformation, secure system development, attack analysis and prevention, as well as testing and assurance.
Computer security --- Engineering systems --- Software engineering --- Computer networks --- Computer Science --- Engineering & Applied Sciences --- Security measures --- Access control --- Computer security. --- Software engineering. --- Sensor networks --- Computer software engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Operating systems (Computers). --- Data encryption (Computer science). --- Algorithms. --- Management information systems. --- Computer Science. --- Systems and Data Security. --- Software Engineering. --- Operating Systems. --- Algorithm Analysis and Problem Complexity. --- Management of Computing and Information Systems. --- Data Encryption. --- Engineering --- Data protection --- Security systems --- Hacking --- Computer-based information systems --- EIS (Information systems) --- Executive information systems --- MIS (Information systems) --- Sociotechnical systems --- Information resources management --- Management --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer operating systems --- Disk operating systems --- Systems software --- Informatics --- Science --- Communication systems --- Foundations --- Operating systems --- Computer software. --- Information Systems. --- Cryptology. --- Software, Computer
Choose an application
This book constitutes the refereed proceedings of the 5th International Symposium on Engineering Secure Software and Systems, ESSoS 2013, held in Paris, France, in February/March 2013. The 13 revised full papers presented together with two idea papers were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on secure programming, policies, proving, formal methods, and analyzing.
Computer security --- Computer networks --- Software engineering --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Security measures --- Information Technology --- Computer Science (Hardware & Networks) --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Software engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computers. --- Computer Science. --- Computer Communication Networks. --- Data Encryption. --- Software Engineering/Programming and Operating Systems. --- Data Structures, Cryptology and Information Theory. --- Math Applications in Computer Science. --- Models and Principles. --- Mathematics. --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Informatics --- Science --- Computer software engineering --- Engineering --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer science—Mathematics. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Distributed processing --- Computer networks. --- Data encryption (Computer science)
Choose an application
This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010. The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.
Computer security --- Software engineering --- Sensor networks --- Computer Science --- Telecommunications --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Information Technology --- Computer Science (Hardware & Networks) --- Computer science. --- Computer communication systems. --- Software engineering. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer science --- Computers. --- Computer Science. --- Computer Communication Networks. --- Software Engineering/Programming and Operating Systems. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Math Applications in Computer Science. --- Models and Principles. --- Mathematics. --- Automatic computers --- Automatic data processors --- Computer hardware --- Computing machines (Computers) --- Electronic brains --- Electronic calculating-machines --- Electronic computers --- Hardware, Computer --- Computer systems --- Cybernetics --- Machine theory --- Calculators --- Cyberspace --- Computer mathematics --- Discrete mathematics --- Electronic data processing --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- File organization (Computer science) --- Abstract data types (Computer science) --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Mathematics --- Distributed processing --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Computer science—Mathematics.
Listing 1 - 3 of 3 |
Sort by
|