Skip to main content

Software Security -- Theories and Systems

Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers

  • Conference proceedings
  • © 2003

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2609)

Included in the following conference series:

Conference proceedings info: ISSS 2002.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (26 papers)

  1. Security for Pervasive Computing

  2. Security for P2P Systems and Autonomous Distributed Agents

  3. Privacy Issues

  4. Secure Software Circulation and Secure C Language

  5. Securing Programs by Rewriting and Sandboxing

  6. Secure Mail System Construction

  7. Some Security Systems

  8. Proof-Carrying Code and Type Systems for Security Protocols

  9. Authentication Protocols

Other volumes

  1. Software Security — Theories and Systems

Keywords

About this book

For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed.

This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.

Editors and Affiliations

  • Keio University, Tokyo, Japan

    Mitsuhiro Okada

  • University of Pennsylvania, Philadelphia, USA

    Benjamin C. Pierce, Andre Scedrov

  • Keio University, Fujisawa, Japan

    Hideyuki Tokuda

  • University of Tokyo, Tokyo, Japan

    Akinori Yonezawa

Bibliographic Information

Publish with us