ISSS 2002:
Tokyo,
Japan
Mitsuhiro Okada, Benjamin C. Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa (Eds.):
Software Security -- Theories and Systems, Mext-NSF-JSPS International Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised Papers.
Lecture Notes in Computer Science 2609 Springer 2003, ISBN 3-540-00708-3 BibTeX
@proceedings{DBLP:conf/isss2/2002,
editor = {Mitsuhiro Okada and
Benjamin C. Pierce and
Andre Scedrov and
Hideyuki Tokuda and
Akinori Yonezawa},
title = {Software Security -- Theories and Systems, Mext-NSF-JSPS International
Symposium, ISSS 2002, Tokyo, Japan, November 8-10, 2002, Revised
Papers},
booktitle = {ISSS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2609},
year = {2003},
isbn = {3-540-00708-3},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Roy H. Campbell, Jalal Al-Muhtadi, Prasad Naldurg, Geetanjali Sampemane, M. Dennis Mickunas:
Towards Security and Privacy for Pervasive Computing.
1-15
Electronic Edition (link) BibTeX
- Frank Stajano:
Security for Whom?: The Shifting Security Assumptions of Pervasive Computing.
16-27
Electronic Edition (link) BibTeX
- Kenta Matsumiya, Soko Aoki, Masana Murase, Hideyuki Tokuda:
Active Authentication for Pervasive Computing Environments.
28-41
Electronic Edition (link) BibTeX
- Dan S. Wallach:
A Survey of Peer-to-Peer Security Issues.
42-57
Electronic Edition (link) BibTeX
- John C. Mitchell, Vanessa Teague:
Autonomous Nodes and Distributed Mechanisms.
58-83
Electronic Edition (link) BibTeX
- J. D. Tygar:
Privacy in Sensor Webs and Distributed Information Systems.
84-95
Electronic Edition (link) BibTeX
- Stanislaw Jarecki, Patrick Lincoln, Vitaly Shmatikov:
Negotiated Privacy: (Extended Abstract).
96-111
Electronic Edition (link) BibTeX
- Kazuhiko Kato, Yoshihiro Oyama:
SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation.
112-132
Electronic Edition (link) BibTeX
- Oiwa Yutaka, Tatsurou Sekiguchi, Eijiro Sumii, Akinori Yonezawa:
Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure: Progress Report.
133-153
Electronic Edition (link) BibTeX
- Lujo Bauer, Jarred Ligatti, David Walker:
Types and Effects for Non-interfering Program Monitors.
154-171
Electronic Edition (link) BibTeX
- Takahiro Shinagawa, Kenji Kono, Takashi Masuda:
Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains.
172-184
Electronic Edition (link) BibTeX
- Algis Rudys, Dan S. Wallach:
Enforcing Java Run-Time Properties Using Bytecode Rewriting.
185-200
Electronic Edition (link) BibTeX
- Etsuya Shibayama, Shigeki Hagihara, Naoki Kobayashi, Shin-ya Nishizaki, Kenjiro Taura, Takuo Watanabe:
AnZenMail: A Secure and Certified E-mail System.
201-216
Electronic Edition (link) BibTeX
- Reynald Affeldt, Naoki Kobayashi:
Formalization and Verification of a Mail Server in Coq.
217-233
Electronic Edition (link) BibTeX
- Hiroyuki Nishiyama, Fumio Mizoguchi:
Design and Implementation of Security System Based on Immune System.
234-248
Electronic Edition (link) BibTeX
- Wataru Yamazaki, Fumio Mizoguchi:
Design and Implementation of Access Control System for Smart Office Environment.
249-262
Electronic Edition (link) BibTeX
- Andrew D. Gordon, Alan Jeffrey:
Typing One-to-One and One-to-Many Correspondences in Security Protocols.
263-282
Electronic Edition (link) BibTeX
- George C. Necula, Robert R. Schneck:
Proof-Carrying Code with Untrusted Proof Rules.
283-298
Electronic Edition (link) BibTeX
- Masami Hagiya, Ryo Takemura, Koichi Takahashi, Takamichi Saito:
Verification of Authentication Protocols Based on the Binding Relation.
299-316
Electronic Edition (link) BibTeX
- Cédric Fournet, Martín Abadi:
Hiding Names: Private Authentication in the Applied Pi Calculus.
317-338
Electronic Edition (link) BibTeX
- Ran Canetti, Catherine Meadows, Paul F. Syverson:
Environmental Requirements for Authentication Protocols.
339-355
Electronic Edition (link) BibTeX
- Iliano Cervesato, Nancy A. Durgin, Patrick Lincoln, John C. Mitchell, Andre Scedrov:
A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis.
356-383
Electronic Edition (link) BibTeX
- Iliano Cervesato:
Data Access Specification and the Most Powerful Symbolic Attacker in MSR.
384-416
Electronic Edition (link) BibTeX
- Koji Hasebe, Mitsuhiro Okada:
A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic.
417-440
Electronic Edition (link) BibTeX
- Koji Hasebe, Mitsuhiro Okada:
Formal Analysis of the iKP Electronic Payment Protocols.
441-460
Electronic Edition (link) BibTeX
- Akira Mori, Kokichi Futatsugi:
CafeOBJ as a Tool for Behavioral System Verification.
461-470
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:26:25 2009
by Michael Ley (ley@uni-trier.de)