Engineering Secure Software and Systems最新文献

筛选
英文 中文
A Sound Decision Procedure for the Compositionality of Secrecy 一个完善的保密构成性决策程序
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_10
Martín Ochoa, J. Jürjens, D. Warzecha
{"title":"A Sound Decision Procedure for the Compositionality of Secrecy","authors":"Martín Ochoa, J. Jürjens, D. Warzecha","doi":"10.1007/978-3-642-28166-2_10","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_10","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133566226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Optimal Trust Mining and Computing on Keyed MapReduce 关键MapReduce的最优信任挖掘与计算
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_14
Huafei Zhu, Hong Xiao
{"title":"Optimal Trust Mining and Computing on Keyed MapReduce","authors":"Huafei Zhu, Hong Xiao","doi":"10.1007/978-3-642-28166-2_14","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_14","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121078385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches 通过安全需求工程方法支持ISO 27001信息安全管理体系的开发和文档化
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_2
Kristian Beckers, Stephan Faßbender, M. Heisel, Jan-Christoph Küster, Holger Schmidt
{"title":"Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches","authors":"Kristian Beckers, Stephan Faßbender, M. Heisel, Jan-Christoph Küster, Holger Schmidt","doi":"10.1007/978-3-642-28166-2_2","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_2","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"189 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124314231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
An Idea of an Independent Validation of Vulnerability Discovery Models 一种漏洞发现模型独立验证的思想
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_9
Viet Hung Nguyen, F. Massacci
{"title":"An Idea of an Independent Validation of Vulnerability Discovery Models","authors":"Viet Hung Nguyen, F. Massacci","doi":"10.1007/978-3-642-28166-2_9","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_9","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129989408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Task Ordering Approach for Automatic Trust Establishment 一种自动建立信任的任务排序方法
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_8
Francisco Moyano, M. C. Gago, Isaac Agudo, Javier López
{"title":"A Task Ordering Approach for Automatic Trust Establishment","authors":"Francisco Moyano, M. C. Gago, Isaac Agudo, Javier López","doi":"10.1007/978-3-642-28166-2_8","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_8","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114497370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused Java卡上的应用程序重放攻击:当垃圾收集器感到困惑时
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_1
G. Barbu, P. Hoogvorst, Guillaume Duc
{"title":"Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused","authors":"G. Barbu, P. Hoogvorst, Guillaume Duc","doi":"10.1007/978-3-642-28166-2_1","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_1","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129336616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Runtime Enforcement of Information Flow Security in Tree Manipulating Processes 树操作过程中信息流安全的运行时实施
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_6
Máté Kovács, H. Seidl
{"title":"Runtime Enforcement of Information Flow Security in Tree Manipulating Processes","authors":"Máté Kovács, H. Seidl","doi":"10.1007/978-3-642-28166-2_6","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_6","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129563196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Formalisation and Implementation of the XACML Access Control Mechanism XACML访问控制机制的形式化和实现
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_7
M. Masi, R. Pugliese, F. Tiezzi
{"title":"Formalisation and Implementation of the XACML Access Control Mechanism","authors":"M. Masi, R. Pugliese, F. Tiezzi","doi":"10.1007/978-3-642-28166-2_7","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_7","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134457536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 41
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques 剽窃智能手机应用程序:攻击策略和防御技术
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_11
Rahul Potharaju, Andrew Newell, C. Nita-Rotaru, X. Zhang
{"title":"Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques","authors":"Rahul Potharaju, Andrew Newell, C. Nita-Rotaru, X. Zhang","doi":"10.1007/978-3-642-28166-2_11","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_11","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121157641","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 81
Typed Assembler for a RISC Crypto-Processor RISC加密处理器的类型化汇编程序
Engineering Secure Software and Systems Pub Date : 2012-02-16 DOI: 10.1007/978-3-642-28166-2_3
Peter T. Breuer, Jonathan P. Bowen
{"title":"Typed Assembler for a RISC Crypto-Processor","authors":"Peter T. Breuer, Jonathan P. Bowen","doi":"10.1007/978-3-642-28166-2_3","DOIUrl":"https://doi.org/10.1007/978-3-642-28166-2_3","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126484250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信