Logo - springer
Slogan - springer

Computer Science - Communication Networks | Engineering Secure Software and Systems - 6th International Symposium, ESSoS 2014, Munich, Germany,

Engineering Secure Software and Systems

6th International Symposium, ESSoS 2014, Munich, Germany, February 26-28, 2014. Proceedings

Jürjens, Jan, Piessens, Frank, Bielova, Nataliia (Eds.)

2014, XVIII, 231 p. 59 illus.

Available Formats:

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.


ISBN 978-3-319-04897-0

digitally watermarked, no DRM

The eBook version of this title will be available soon

learn more about Springer eBooks

add to marked items


Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.


(net) price for USA

ISBN 978-3-319-04896-3

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days

add to marked items

This book constitutes the refereed proceedings of the 6th International Symposium on Engineering Secure Software and Systems, ESSoS 2014, held in Munich, Germany, in February 2014.
The 11 full papers presented together with 4 idea papers were carefully reviewed and selected from 55 submissions. The symposium features the following topics: model-based security, formal methods, web and mobile security and applications.

Content Level » Research

Keywords » economics of security embedded secure software - embedded secure software - model-driven engineering - security policies - smartcards

Related subjects » Communication Networks - Information Systems and Applications - Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents 

Model-Based Security.- Detecting Code Reuse Attacks with a Model of Conformant Program Execution.- Security@Runtime: A Flexible MDE Approach to Enforce Fine-Grained Security Policies.- Idea: Towards a Vision of Engineering Controlled Interaction Execution for Information Services.- Formal Methods.- Automated Formal Verification of Application-Specific Security Properties.- Fault-Tolerant Non-interference .- Quantitative Security Analysis for Programs with Low Input and Noisy Output.- A Modeling and Formal Approach for the Precise Specification of Security Patterns.- On the Relation between Redactable and Sanitizable Signature Schemes.- Idea: Towards a Working Fully Homomorphic Crypto-processor: Practice and the Secret Computer.- Web and Mobile Security.- Architectures for Inlining Security Monitors in Web Applications.- Automatic and Robust Client-Side Protection for Cookie-Based Sessions.- Security Testing of GSM Implementations.- Applications.- User-Centric Security Assessment of Software Configurations: A Case Study.- Idea: Security Engineering Principles for Day Two Car2X Applications.-Idea: Embedded Fault Injection Simulator on Smartcard.

Popular Content within this publication 



Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Computer Communication Networks.