© 2010

Engineering Secure Software and Systems

Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010. Proceedings

  • Fabio Massacci
  • Dan Wallach
  • Nicola Zannone
  • Fast track conference proceeding

  • Unique visibility

  • State of the art research

Conference proceedings ESSoS 2010

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5965)

Table of contents

  1. Front Matter
  2. Session 1. Attack Analysis and Prevention I

    1. Francesco Gadaleta, Yves Younan, Wouter Joosen
      Pages 1-17
    2. Philippe De Ryck, Lieven Desmet, Thomas Heyman, Frank Piessens, Wouter Joosen
      Pages 18-34
    3. Igor Santos, Felix Brezo, Javier Nieves, Yoseba K. Penya, Borja Sanz, Carlos Laorden et al.
      Pages 35-43
  3. Session 2. Attack Analysis and Prevention II

    1. Christian Hammer
      Pages 44-60
    2. James Walden, Maureen Doyle, Robert Lenhof, John Murray
      Pages 61-69
    3. Karsten Sohr, Bernhard Berger
      Pages 70-78
  4. Session 3. Policy Verification and Enforcement I

    1. Alfredo Pironti, Jan Jürjens
      Pages 79-95
    2. Martin Johns, Christian Beyerlein, Rosemaria Giesecke, Joachim Posegga
      Pages 96-113
    3. Per Håkon Meland, Inger Anne Tøndel, Jostein Jensen
      Pages 114-122
  5. Session 4. Policy Verification and Enforcement II

    1. Stere Preda, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro, Laurent Toutain
      Pages 123-139
    2. Clara Bertolissi, Maribel Fernández
      Pages 140-156
    3. Achim D. Brucker, Helmut Petritsch
      Pages 157-165
  6. Session 5. Secure System and Software Development I

  7. Session 6. Secure System and Software Development II

    1. David Basin, Manuel Clavel, Marina Egea, Michael Schläpfer
      Pages 201-217
    2. Albin Zuccato, Nils Daniels, Cheevarat Jampathom, Mikael Nilson
      Pages 218-230
    3. Aida Omerovic, Anette Andresen, Håvard Grindheim, Per Myrseth, Atle Refsdal, Ketil Stølen et al.
      Pages 231-240
  8. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010.

The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.


Java calculus model checking program rewriting security architecture security assurance security measurement security requirements threat modeling verification verification techniques

Editors and affiliations

  • Fabio Massacci
    • 1
  • Dan Wallach
    • 2
  • Nicola Zannone
    • 3
  1. 1.Dipartimento Ingegneria e Scienza dell’InformazioneUniversità di TrentoPovo (Trento)Italy
  2. 2.Department of Computer ScienceRice UniversityHoustonUSA
  3. 3.Faculty of Mathematics and Computer ScienceEindhoven University of TechnologyEindhovenThe Netherlands

Bibliographic information

Industry Sectors
IT & Software
Consumer Packaged Goods
Materials & Steel
Finance, Business & Banking
Energy, Utilities & Environment
Oil, Gas & Geosciences