Advertisement

Engineering Secure Software and Systems

7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings

  • Frank Piessens
  • Juan Caballero
  • Nataliia Bielova
Conference proceedings ESSoS 2015

Part of the Lecture Notes in Computer Science book series (LNCS, volume 8978)

Table of contents

  1. Front Matter
  2. Formal Methods

    1. Stefano Calzavara, Alvise Rabitti, Michele Bugliesi
      Pages 1-16
    2. Marouane Fazouane, Henning Kopp, Rens W. van der Heijden, Daniel Le Métayer, Frank Kargl
      Pages 17-33
    3. Martín Ochoa, Jorge Cuéllar, Alexander Pretschner, Per Hallgren
      Pages 34-42
  3. Machine Learning

    1. Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon
      Pages 51-67
    2. David Pfaff, Sebastian Hack, Christian Hammer
      Pages 68-85
  4. Cloud and Passwords

    1. Thuy D. Nguyen, Mark Gondree, Jean Khosalim, Cynthia Irvine
      Pages 86-101
    2. Philippe Massonet, Jesus Luna, Alain Pannetrat, Ruben Trapero
      Pages 102-110
    3. Raoul Strackx, Pieter Philippaerts, Frédéric Vogels
      Pages 111-118
    4. Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Abdelberi Chaabane
      Pages 119-132
  5. Measurements and Ontologies

    1. Sebastian Banescu, Martín Ochoa, Nils Kunze, Alexander Pretschner
      Pages 149-156
    2. Amina Souag, Camille Salinesi, Raúl Mazo, Isabelle Comyn-Wattiau
      Pages 157-177
  6. Access Control

    1. Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan
      Pages 178-195
    2. Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen
      Pages 196-210
    3. Lars Hamann, Karsten Sohr, Martin Gogolla
      Pages 211-226
  7. Back Matter

About these proceedings

Introduction

This book constitutes the refereed proceedings of the 7th International Symposium on Engineering Secure Software and Systems, ESSoS 2015, held in Milan, Italy, in March 2015. The 11 full papers presented together with 5 short papers were carefully reviewed and selected from 41 submissions. The symposium features the following topics: formal methods; cloud passwords; machine learning; measurements ontologies; and access control.

Keywords

model checking for security secure architecture and design security requirements and policies security testing threat modeling and analysis of vulnerabilities verification techniques for security properties

Editors and affiliations

  • Frank Piessens
    • 1
  • Juan Caballero
    • 2
  • Nataliia Bielova
    • 3
  1. 1.iMinds-DistriNetKU LeuvenBelgium
  2. 2.IMDEA Software InstitutePozuelo de AlarcónSpain
  3. 3.Inria Sophia Antipolis – MediterraneeSophia Antipolis CedexFrance

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-319-15618-7
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-15617-0
  • Online ISBN 978-3-319-15618-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Energy, Utilities & Environment
Aerospace
Oil, Gas & Geosciences
Engineering