{"title":"Design and Implementation of Security System Based on Immune System","authors":"Hiroyuki Nishiyama, F. Mizoguchi","doi":"10.1007/3-540-36532-X_15","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_15","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128238688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CafeOBJ as a Tool for Behavioral System Verification","authors":"A. Mori, K. Futatsugi","doi":"10.1007/3-540-36532-X_26","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_26","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128783016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Formalization and Verification of a Mail Server in Coq","authors":"Reynald Affeldt, N. Kobayashi","doi":"10.1007/3-540-36532-X_14","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_14","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"281 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122940033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Types and Effects for Non-interfering Program Monitors","authors":"Lujo Bauer, Jay Ligatti, D. Walker","doi":"10.1007/3-540-36532-X_10","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_10","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123621574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Data Access Specification and the Most Powerful Symbolic Attacker in MSR","authors":"I. Cervesato","doi":"10.1007/3-540-36532-X_23","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_23","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125572886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Y. Oiwa, Tatsurou Sekiguchi, Eijiro Sumii, A. Yonezawa
{"title":"Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress Report","authors":"Y. Oiwa, Tatsurou Sekiguchi, Eijiro Sumii, A. Yonezawa","doi":"10.1007/3-540-36532-X_9","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_9","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"219 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131528699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
R. Campbell, J. Al-Muhtadi, P. Naldurg, Geetanjali Sampemane, M. D. Mickunas
{"title":"Towards Security and Privacy for Pervasive Computing","authors":"R. Campbell, J. Al-Muhtadi, P. Naldurg, Geetanjali Sampemane, M. D. Mickunas","doi":"10.1007/3-540-36532-X_1","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_1","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125617892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Survey of Peer-to-Peer Security Issues","authors":"D. Wallach","doi":"10.1007/3-540-36532-X_4","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_4","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128034768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Typing One-to-One and One-to-Many Correspondences in Security Protocols","authors":"A. Gordon, A. Jeffrey","doi":"10.1007/3-540-36532-X_17","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_17","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123358357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains","authors":"Takahiro Shinagawa, K. Kono, T. Masuda","doi":"10.1007/3-540-36532-X_11","DOIUrl":"https://doi.org/10.1007/3-540-36532-X_11","url":null,"abstract":"","PeriodicalId":118601,"journal":{"name":"International Symposium on Systems Synthesis","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2002-11-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130006880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}