default search action
ISSS 2003: Tokyo, Japan
- Kokichi Futatsugi, Fumio Mizoguchi, Naoki Yonezaki:
Software Security - Theories and Systems, Second Mext-NSF-JSPS International Symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003, Revised Papers. Lecture Notes in Computer Science 3233, Springer 2004, ISBN 3-540-23635-X
Analysis of Protocols and Cryptography
- Frederick Butler, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov:
Verifying Confidentiality and Authentication in Kerberos 5. 1-24 - Daigo Tomioka, Shin-ya Nishizaki, Ritsuya Ikeda:
A Cost Estimation Calculus for Analyzing the Resistance to Denial-of-Service Attack. 25-44 - Kazuhiro Ogata, Kokichi Futatsugi:
Formal Analysis of the NetBill Electronic Commerce Protocol. 45-64 - Koji Hasebe, Mitsuhiro Okada:
Inferences on Honesty in Compositional Logic for Protocol Analysis. 65-86 - Ashraf Bhery, Shigeki Hagihara, Naoki Yonezaki:
A Formal System for Analysis of Cryptographic Encryption and Their Security Properties. 87-112
Verification of Security Properties
- Weijiang Yu, Aloysius K. Mok:
Formal Specification and Verification of Resource Bound Security Using PVS. 113-133 - Bart Jacobs, Erik Poll:
Java Program Verification at Nijmegen: Developments and Perspective. 134-153 - Noriaki Yoshiura:
Decision Procedures for Several Properties of Reactive System Specifications. 154-173 - Andrei Sabelfeld, Andrew C. Myers:
A Model for Delimited Information Release. 174-191
Safe Implementation of Programming Languages
- Kohei Suenaga
, Yutaka Oiwa, Eijiro Sumii, Akinori Yonezawa:
The Interface Definition Language for Fail-Safe C. 192-208 - Matthew Harren, George C. Necula:
Lightweight Wrappers for Interfacing with Binary Code in CCured. 209-225
Secure Execution Environments
- Akira Mori:
Detecting Unknown Computer Viruses - A New Approach. 226-241 - Hirotake Abe, Kazuhiko Kato:
Security Policy Descriptions Through the Use of Control Structure of a Target Program. 242-261 - Yasushi Shinjo, Yoshinori Nakata, Kozo Itano:
Securing RPC with a Reference Monitor for System Calls. 262-280 - Osamu Sato, Richard Potter, Mitsuharu Yamamoto, Masami Hagiya:
UML Scrapbook and Realization of Snapshot Programming Environment. 281-295
Secure Systems and Security Management
- David P. Gilliam:
Managing Information Technology Security Risk. 296-317 - Fabrizio Baiardi
, Alessandro Falleni, Riccardo Granchi, Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli:
SEAS: A Secure E-Voting Applet System. 318-329 - Hiroyuki Nishiyama, Yukinobu Mine, Fumio Mizoguchi:
The Design of a Secure Distributed Devices System Based on Immunity. 330-344
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.