|
Showing 1 - 3 of
3 matches in All Departments
|
Engineering Secure Software and Systems - Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings (Paperback, Edition.)
Fabio Massacci, Dan Wallach, Nicola Zannone
|
R1,539
Discovery Miles 15 390
|
Ships in 10 - 15 working days
|
It is our pleasure to welcome you to the proceedings of the Second
International Symposium on Engineering Secure Software and Systems.
This unique event aimed at bringing together researchersfrom
softwareen- neering and security engineering, which might help to
unite and further develop the two communities in this and future
editions. The parallel technical spons- ships from the ACM SIGSAC
(the ACM interest group in security) and ACM SIGSOF (the ACM
interest group in software engineering) is a clear sign of the
importance of this inter-disciplinary research area and its
potential. The di?culty of building secure software systems is no
longer focused on mastering security technology such as
cryptography or access control models. Other important factors
include the complexity of modern networked software systems, the
unpredictability of practical development life cycles, the intertw-
ing of and trade-o? between functionality, security and other
qualities, the d- culty of dealing with human factors, and so
forth. Over the last years, an entire research domain has been
building up around these problems. The conference program included
two major keynotes from Any Gordon (Microsoft Research Cambridge)
on the practical veri?cation of security pro- cols implementation
and Angela Sasse (University College London) on security usability
and an interesting blend of research, industry and idea papers.
It is our pleasure to welcome you to the ?rst edition of the
International S- posium on Engineering Secure Software and Systems.
This unique events aims at bringing together researchers from
Software - gineeringandSecurity Engineering, helping to unite and
further developthe two
communitiesinthisandfutureeditions.Theparalleltechnicalsponsorshipsfrom
the ACM SIGSAC (the ACM interest group in security) and ACM SIGSOFT
(the ACM interest groupin softwareengineering) and the IEEE TCSE is
a clear sign of the importance of this inter-disciplinary research
area and its potential. The di?culty of building secure software
systems is no longer focused on mastering security technology such
as cryptography or access control models. Other important, and less
controllable, factors include the complexity of m- ern networked
software systems, the unpredictability of practical development
lifecycles, the intertwining of and trade-o? between functionality,
security and other qualities, the di?culty of dealing with human
factors, and so forth. Over the last few years, an entire research
domain has been building up around these problems. And although
some battles have been won, the jury is still out on the ?nal
verdict. The conference program included two major keynotes from
Axel Van L- sweerde (U. Louvain) and Wolfram Schulte (Microsoft
Research) and an int- esting blend of research, industry and idea
papers
Security is widely recognized as a main challenge in developing
software. Security Requirements Engineering is an emerging field at
the crossroads between Security and Software Engineering, spurred
by the realization that security must be dealt with from the
earliest phases of the software development process. This book
enables understanding of the deeper issues and challenges in
developing secure systems, the concepts for capturing security
aspects of socio-technical systems, and the support needed by
enterprises for the definition of security policies as dictated by
ISO security standards and data protection legislation. The author
presents the SI* modeling language and the Secure Tropos
methodology to address the problem of modeling and analyzing
security requirements at the organizational level. The SI* language
employs a set of concepts founded on the notions of permission,
delegation, and trust. These concepts are formalized and are shown
to support the requirements analysis process through a formal
reasoning tool. The Secure Tropos methodology provides facilities
for analyzing security requirements and guidelines to identify
appropriate protection mechanisms.
|
You may like...
Operation Joktan
Amir Tsarfati, Steve Yohn
Paperback
(1)
R250
R211
Discovery Miles 2 110
|