Following the success of the International Symposium on Software Security 2002 (ISSS 2002), held in Keio University, Tokyo, November, 2002, ISSS 2003 was held in the Tokyo Institute of Technology, Tokyo, on November 4–6, 2003. This volume is the collection of the papers that were presented at ISSS 2003. The proceedings of ISSS 2002 was published as LNCS 2609. Although the security and reliability of software systems for networked c- puter systems are major concerns of current society, the technology for software securitystillneedstobedevelopedinmanydirections.SimilartoISSS2002,ISSS 2003 aimed to provide a forum for research discussions and exchanges among world-leading scientists in the ?elds of both theoretical and systems aspects of security in software construction. The program of ISSS 2003 was a combination of invited talks and selected research contributions. It included the most recent visions and researches of the 9invitedspeakers,aswellas11contributionsofresearchesfundedbytheMEXT grant-in-aid for scienti?c research on the priority area “Implementation Scheme for Secure Computing” (AnZenKaken). We collected the original contributions after their presentation at the symposium and began a review procedure that resulted in the selection of the papers in this volume. They appear here in ?nal form. ISSS 2003 required a lot of work that was heavily dependent on members of the program committee, and sta?s and graduate students who participated in AnZenKaken. We sincerely thank them for their e?orts and time.
Author(s): Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov (auth.), Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki (eds.)
Series: Lecture Notes in Computer Science 3233
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2004
Language: English
Pages: 352
Tags: Computer Communication Networks; Operating Systems; Data Encryption; Programming Languages, Compilers, Interpreters; Theory of Computation; Management of Computing and Information Systems
Front Matter....Pages -
Verifying Confidentiality and Authentication in Kerberos 5....Pages 1-24
A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack....Pages 25-44
Formal Analysis of the NetBill Electronic Commerce Protocol....Pages 45-64
Inferences on Honesty in Compositional Logic for Protocol Analysis....Pages 65-86
A Formal System for Analysis of Cryptographic Encryption and Their Security Properties....Pages 87-112
Formal Specification and Verification of Resource Bound Security Using PVS....Pages 113-133
Java Program Verification at Nijmegen: Developments and Perspective....Pages 134-153
Decision Procedures for Several Properties of Reactive System Specifications....Pages 154-173
A Model for Delimited Information Release....Pages 174-191
The Interface Definition Language for Fail-Safe C....Pages 192-208
Lightweight Wrappers for Interfacing with Binary Code in CCured....Pages 209-225
Detecting Unknown Computer Viruses – A New Approach –....Pages 226-241
Security Policy Descriptions Through the Use of Control Structure of a Target Program....Pages 242-261
Securing RPC with a Reference Monitor for System Calls....Pages 262-280
UML Scrapbook and Realization of Snapshot Programming Environment....Pages 281-295
Managing Information Technology Security Risk....Pages 296-317
SEAS: A Secure E-Voting Applet System....Pages 318-329
The Design of a Secure Distributed Devices System Based on Immunity....Pages 330-344
Back Matter....Pages -