Roy Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane (auth.), Mitsuhiro Okada, Benjamin C. Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa (eds.)3540007083, 9783540007081
For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed.
This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.
Table of contents :
Towards Security and Privacy for Pervasive Computing….Pages 1-15
Security for Whom? The Shifting Security Assumptions of Pervasive Computing….Pages 16-27
Active Authentication for Pervasive Computing Environments….Pages 28-41
A Survey of Peer-to-Peer Security Issues….Pages 42-57
Autonomous Nodes and Distributed Mechanisms….Pages 58-83
Privacy in Sensor Webs and Distributed Information Systems….Pages 84-95
Negotiated Privacy….Pages 96-111
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation….Pages 112-132
Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report….Pages 133-153
Types and Effects for Non-interfering Program Monitors….Pages 154-171
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains….Pages 172-184
Enforcing Java Run-Time Properties Using Bytecode Rewriting….Pages 185-200
AnZenMail: A Secure and Certified E-mail System….Pages 201-216
Formalization and Verification of a Mail Server in Coq….Pages 217-233
Design and Implementation of Security System Based on Immune System….Pages 234-248
Design and Implementation of Access Control System for Smart Office Environment….Pages 249-262
Typing One-to-One and One-to-Many Correspondences in Security Protocols….Pages 263-282
Proof-Carrying Code with Untrusted Proof Rules….Pages 283-298
Verification of Authentication Protocols Based on the Binding Relation….Pages 299-316
Hiding Names: Private Authentication in the Applied Pi Calculus….Pages 317-338
Environmental Requirements for Authentication Protocols….Pages 339-355
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis….Pages 356-383
Data Access Specification and the Most Powerful Symbolic Attacker in MSR ….Pages 384-416
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic….Pages 417-440
Formal Analysis of the i KP Electronic Payment Protocols….Pages 441-460
CafeOBJ as a Tool for Behavioral System Verification….Pages 461-470
Reviews
There are no reviews yet.