For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed.
This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.
Author(s): Roy Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane (auth.), Mitsuhiro Okada, Benjamin C. Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa (eds.)
Series: Lecture Notes in Computer Science 2609
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003
Language: English
Pages: 476
Tags: Operating Systems; Computer Communication Networks; Programming Languages, Compilers, Interpreters; Data Encryption; Logics and Meanings of Programs; Management of Computing and Information Systems
Towards Security and Privacy for Pervasive Computing....Pages 1-15
Security for Whom? The Shifting Security Assumptions of Pervasive Computing....Pages 16-27
Active Authentication for Pervasive Computing Environments....Pages 28-41
A Survey of Peer-to-Peer Security Issues....Pages 42-57
Autonomous Nodes and Distributed Mechanisms....Pages 58-83
Privacy in Sensor Webs and Distributed Information Systems....Pages 84-95
Negotiated Privacy....Pages 96-111
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation....Pages 112-132
Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report....Pages 133-153
Types and Effects for Non-interfering Program Monitors....Pages 154-171
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains....Pages 172-184
Enforcing Java Run-Time Properties Using Bytecode Rewriting....Pages 185-200
AnZenMail: A Secure and Certified E-mail System....Pages 201-216
Formalization and Verification of a Mail Server in Coq....Pages 217-233
Design and Implementation of Security System Based on Immune System....Pages 234-248
Design and Implementation of Access Control System for Smart Office Environment....Pages 249-262
Typing One-to-One and One-to-Many Correspondences in Security Protocols....Pages 263-282
Proof-Carrying Code with Untrusted Proof Rules....Pages 283-298
Verification of Authentication Protocols Based on the Binding Relation....Pages 299-316
Hiding Names: Private Authentication in the Applied Pi Calculus....Pages 317-338
Environmental Requirements for Authentication Protocols....Pages 339-355
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis....Pages 356-383
Data Access Specification and the Most Powerful Symbolic Attacker in MSR ....Pages 384-416
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic....Pages 417-440
Formal Analysis of the i KP Electronic Payment Protocols....Pages 441-460
CafeOBJ as a Tool for Behavioral System Verification....Pages 461-470