Skip to main content
  • Conference proceedings
  • © 2012

Engineering Secure Software and Systems

4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012, Proceedings

  • State-of-the-art research
  • Fast-track conference proceedings
  • Unique visibility

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7159)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ESSoS: International Symposium on Engineering Secure Software and Systems

Conference proceedings info: ESSoS 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (14 papers)

  1. Front Matter

  2. Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused

    • Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc
    Pages 1-13
  3. Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches

    • Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt
    Pages 14-21
  4. Typed Assembler for a RISC Crypto-Processor

    • Peter T. Breuer, Jonathan P. Bowen
    Pages 22-29
  5. Transversal Policy Conflict Detection

    • Matteo Maria Casalino, Henrik Plate, Slim Trabelsi
    Pages 30-37
  6. Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings

    • Samson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr
    Pages 38-45
  7. Formalisation and Implementation of the XACML Access Control Mechanism

    • Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi
    Pages 60-74
  8. A Task Ordering Approach for Automatic Trust Establishment

    • Francisco Moyano, Carmen Fernandez-Gago, Isaac Agudo, Javier Lopez
    Pages 75-88
  9. An Idea of an Independent Validation of Vulnerability Discovery Models

    • Viet Hung Nguyen, Fabio Massacci
    Pages 89-96
  10. A Sound Decision Procedure for the Compositionality of Secrecy

    • Martín Ochoa, Jan Jürjens, Daniel Warzecha
    Pages 97-105
  11. Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques

    • Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang
    Pages 106-120
  12. Design of Adaptive Security Mechanisms for Real-Time Embedded Systems

    • Mehrdad Saadatmand, Antonio Cicchetti, Mikael Sjödin
    Pages 121-134
  13. Hunting Application-Level Logical Errors

    • George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis
    Pages 135-142
  14. Optimal Trust Mining and Computing on Keyed MapReduce

    • Huafei Zhu, Hong Xiao
    Pages 143-150
  15. Back Matter

Other Volumes

  1. Engineering Secure Software and Systems

About this book

This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012, held in Eindhoven, The Netherlands, in February 2012. The 7 revised full papers presented together with 7 idea papers were carefully reviewed and selected from 53 submissions. The full papers present new research results in the field of engineering secure software and systems, whereas the idea papers give crisp expositions of interesting, novel ideas in the early stages of development.

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access