Skip to main content

Engineering Secure Software and Systems

Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings

  • Conference proceedings
  • © 2010

Overview

  • Fast track conference proceeding
  • Unique visibility
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 5965)

Part of the book sub series: Security and Cryptology (LNSC)

Included in the following conference series:

Conference proceedings info: ESSoS 2010.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (18 papers)

  1. Session 1. Attack Analysis and Prevention I

  2. Session 2. Attack Analysis and Prevention II

  3. Session 3. Policy Verification and Enforcement I

  4. Session 4. Policy Verification and Enforcement II

  5. Session 5. Secure System and Software Development I

  6. Session 6. Secure System and Software Development II

Other volumes

  1. Engineering Secure Software and Systems

Keywords

About this book

It is our pleasure to welcome you to the proceedings of the Second International Symposium on Engineering Secure Software and Systems. This unique event aimed at bringing together researchersfrom softwareen- neering and security engineering, which might help to unite and further develop the two communities in this and future editions. The parallel technical spons- ships from the ACM SIGSAC (the ACM interest group in security) and ACM SIGSOF (the ACM interest group in software engineering) is a clear sign of the importance of this inter-disciplinary research area and its potential. The di?culty of building secure software systems is no longer focused on mastering security technology such as cryptography or access control models. Other important factors include the complexity of modern networked software systems, the unpredictability of practical development life cycles, the intertw- ing of and trade-o? between functionality, security and other qualities, the d- culty of dealing with human factors, and so forth. Over the last years, an entire research domain has been building up around these problems. The conference program included two major keynotes from Any Gordon (Microsoft Research Cambridge) on the practical veri?cation of security pro- cols implementation and Angela Sasse (University College London) on security usability and an interesting blend of research, industry and idea papers.

Editors and Affiliations

  • Dipartimento Ingegneria e Scienza dell’Informazione, Università di Trento, Povo (Trento), Italy

    Fabio Massacci

  • Department of Computer Science, Rice University, Houston, USA

    Dan Wallach

  • Faculty of Mathematics and Computer Science, Eindhoven University of Technology, Eindhoven, The Netherlands

    Nicola Zannone

Bibliographic Information

Publish with us