Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused -- Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches -- Typed Assembler for a RISC Crypto-Processor -- Transversal Policy Conflict Detection -- Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings -- Runtime Enforcement of Information Flow Security in Tree Manipulating Processes -- Formalisation and Implementation of the XACML Access Control Mechanism -- A Task Ordering Approach for Automatic Trust Establishment -- An Idea of an Independent Validation of Vulnerability Discovery Models -- A Sound Decision Procedure for the Compositionality of Secrecy -- Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques -- Design of Adaptive Security Mechanisms for Real-Time Embedded Systems -- Hunting Application-Level Logical Errors -- Optimal Trust Mining and Computing on Keyed MapReduce
Summary
This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012, held in Eindhoven, The Netherlands, in February 2012. The 7 revised full papers presented together with 7 idea papers were carefully reviewed and selected from 53 submissions. The full papers present new research results in the field of engineering secure software and systems, whereas the idea papers give crisp expositions of interesting, novel ideas in the early stages of development
Analysis
Computer science
Computer Communication Networks
Software engineering
Data structures (Computer science)
Data encryption (Computer science)
Data Encryption
Software Engineering/Programming and Operating Systems
Data Structures, Cryptology and Information Theory
Math Applications in Computer Science
Models and Principles
operating systems
wiskunde
mathematics
computerwetenschappen
computer sciences
informatietheorie
information theory
gegevensstructuren
data structures
computernetwerken
computer networks
gegevensbeheer
data management
modellen
models
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Bibliography
Includes bibliographical references and author index