Software Security — Theories and Systems

Mext-NSF-JSPS International Symposium, ISSS 2002 Tokyo, Japan, November 8–10, 2002 Revised Papers

  • Mitsuhiro Okada
  • Benjamin C. Pierce
  • Andre Scedrov
  • Hideyuki Tokuda
  • Akinori Yonezawa
Conference proceedings ISSS 2002

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2609)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Security for Pervasive Computing

    1. Roy Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas
      Pages 1-15
    2. Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda
      Pages 28-41
  3. Security for P2P Systems and Autonomous Distributed Agents

    1. Dan S. Wallach
      Pages 42-57
    2. John C. Mitchell, Vanessa Teague
      Pages 58-83
  4. Privacy Issues

    1. Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov
      Pages 96-111
  5. Secure Software Circulation and Secure C Language

    1. Yutaka Oiwa, Tatsurou Sekiguchi, Eijiro Sumii, Akinori Yonezawa
      Pages 133-153
  6. Securing Programs by Rewriting and Sandboxing

    1. Lujo Bauer, Jarred Ligatti, David Walker
      Pages 154-171
    2. Takahiro Shinagawa, Kenji Kono, Takashi Masuda
      Pages 172-184
    3. Algis Rudys, Dan S. Wallach
      Pages 185-200
  7. Secure Mail System Construction

    1. Etsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe
      Pages 201-216
    2. Reynald Affeldt, Naoki Kobayashi
      Pages 217-233
  8. Some Security Systems

    1. Hiroyuki Nishiyama, Fumio Mizoguchi
      Pages 234-248
  9. Proof-Carrying Code and Type Systems for Security Protocols

    1. George C. Necula, Robert R. Schneck
      Pages 283-298
  10. Authentication Protocols

    1. Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito
      Pages 299-316
    2. Cédric Fournet, Martín Abadi
      Pages 317-338
    3. Ran Canetti, Catherine Meadows, Paul Syverson
      Pages 339-355
  11. Multiset Rewriting for Protocol Analysis

    1. I. Cervesato, N. Durgin, P. Lincoln, J. Mitchell, A. Scedrov
      Pages 356-383
  12. Verification Methods and Tools

    1. Kazuhiro Ogata, Kokichi Futatsugi
      Pages 441-460
    2. Akira Mori, Kokichi Futatsugi
      Pages 461-470
  13. Back Matter
    Pages 471-471

About these proceedings


For more than the last three decades, the security of software systems has been an important area of computer science, yet it is a rather recent general recognition that technologies for software security are highly needed.

This book assesses the state of the art in software and systems security by presenting a carefully arranged selection of revised invited and reviewed papers. It covers basic aspects and recently developed topics such as security of pervasive computing, peer-to-peer systems and autonomous distributed agents, secure software circulation, compilers for fail-safe C language, construction of secure mail systems, type systems and multiset rewriting systems for security protocols, and privacy issues as well.


Access Control Authentication Compiler Computer Viruses Coq Dependable Computing Information Monitor Reliable Systems Software Security Symbol Systems Security logic security verification

Editors and affiliations

  • Mitsuhiro Okada
    • 1
  • Benjamin C. Pierce
    • 2
  • Andre Scedrov
    • 3
  • Hideyuki Tokuda
    • 4
  • Akinori Yonezawa
    • 5
  1. 1.Keio UniversityTokyoJapan
  2. 2.University of PennsylvaniaPhiladelphiaUSA
  3. 3.University of PennsylvaniaPhiladelphiaUSA
  4. 4.Keio UniversityFujisawaJapan
  5. 5.University of TokyoTokyoJapan

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-00708-1
  • Online ISBN 978-3-540-36532-7
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
IT & Software
Finance, Business & Banking