Skip to main content
  • Conference proceedings
  • © 2003

Software Security -- Theories and Systems

Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2609)

Conference series link(s): ISSS: International Symposium on Software Security

Conference proceedings info: ISSS 2002.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (26 papers)

  1. Front Matter

    Pages I-XI
  2. Security for Pervasive Computing

    1. Towards Security and Privacy for Pervasive Computing

      • Roy Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas
      Pages 1-15
    2. Active Authentication for Pervasive Computing Environments

      • Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda
      Pages 28-41
  3. Security for P2P Systems and Autonomous Distributed Agents

    1. A Survey of Peer-to-Peer Security Issues

      • Dan S. Wallach
      Pages 42-57
    2. Autonomous Nodes and Distributed Mechanisms

      • John C. Mitchell, Vanessa Teague
      Pages 58-83
  4. Privacy Issues

    1. Negotiated Privacy

      • Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov
      Pages 96-111
  5. Secure Software Circulation and Secure C Language

    1. Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report

      • Yutaka Oiwa, Tatsurou Sekiguchi, Eijiro Sumii, Akinori Yonezawa
      Pages 133-153
  6. Securing Programs by Rewriting and Sandboxing

    1. Types and Effects for Non-interfering Program Monitors

      • Lujo Bauer, Jarred Ligatti, David Walker
      Pages 154-171
    2. Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains

      • Takahiro Shinagawa, Kenji Kono, Takashi Masuda
      Pages 172-184
    3. Enforcing Java Run-Time Properties Using Bytecode Rewriting

      • Algis Rudys, Dan S. Wallach
      Pages 185-200
  7. Secure Mail System Construction

    1. AnZenMail: A Secure and Certified E-mail System

      • Etsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe
      Pages 201-216
    2. Formalization and Verification of a Mail Server in Coq

      • Reynald Affeldt, Naoki Kobayashi
      Pages 217-233
  8. Some Security Systems

    1. Design and Implementation of Security System Based on Immune System

      • Hiroyuki Nishiyama, Fumio Mizoguchi
      Pages 234-248
  9. Proof-Carrying Code and Type Systems for Security Protocols

    1. Proof-Carrying Code with Untrusted Proof Rules

      • George C. Necula, Robert R. Schneck
      Pages 283-298
  10. Authentication Protocols

    1. Verification of Authentication Protocols Based on the Binding Relation

      • Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito
      Pages 299-316

Other Volumes

  1. Software Security — Theories and Systems

About this book

For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed.

This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.

Editors and Affiliations

  • Keio University, Tokyo, Japan

    Mitsuhiro Okada

  • University of Pennsylvania, Philadelphia, USA

    Benjamin C. Pierce, Andre Scedrov

  • Keio University, Fujisawa, Japan

    Hideyuki Tokuda

  • University of Tokyo, Tokyo, Japan

    Akinori Yonezawa

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access