Software Security — Theories and Systems: Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed.

This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.

Author(s): Roy Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane (auth.), Mitsuhiro Okada, Benjamin C. Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa (eds.)
Series: Lecture Notes in Computer Science 2609
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 476
Tags: Operating Systems; Computer Communication Networks; Programming Languages, Compilers, Interpreters; Data Encryption; Logics and Meanings of Programs; Management of Computing and Information Systems

Towards Security and Privacy for Pervasive Computing....Pages 1-15
Security for Whom? The Shifting Security Assumptions of Pervasive Computing....Pages 16-27
Active Authentication for Pervasive Computing Environments....Pages 28-41
A Survey of Peer-to-Peer Security Issues....Pages 42-57
Autonomous Nodes and Distributed Mechanisms....Pages 58-83
Privacy in Sensor Webs and Distributed Information Systems....Pages 84-95
Negotiated Privacy....Pages 96-111
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation....Pages 112-132
Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report....Pages 133-153
Types and Effects for Non-interfering Program Monitors....Pages 154-171
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains....Pages 172-184
Enforcing Java Run-Time Properties Using Bytecode Rewriting....Pages 185-200
AnZenMail: A Secure and Certified E-mail System....Pages 201-216
Formalization and Verification of a Mail Server in Coq....Pages 217-233
Design and Implementation of Security System Based on Immune System....Pages 234-248
Design and Implementation of Access Control System for Smart Office Environment....Pages 249-262
Typing One-to-One and One-to-Many Correspondences in Security Protocols....Pages 263-282
Proof-Carrying Code with Untrusted Proof Rules....Pages 283-298
Verification of Authentication Protocols Based on the Binding Relation....Pages 299-316
Hiding Names: Private Authentication in the Applied Pi Calculus....Pages 317-338
Environmental Requirements for Authentication Protocols....Pages 339-355
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis....Pages 356-383
Data Access Specification and the Most Powerful Symbolic Attacker in MSR ....Pages 384-416
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic....Pages 417-440
Formal Analysis of the i KP Electronic Payment Protocols....Pages 441-460
CafeOBJ as a Tool for Behavioral System Verification....Pages 461-470