↓ Skip to main content

Software Security — Theories and Systems

Overview of attention for book
Cover of 'Software Security — Theories and Systems'

Table of Contents

  1. Altmetric Badge
    Book Overview
  2. Altmetric Badge
    Chapter 1 Towards Security and Privacy for Pervasive Computing
  3. Altmetric Badge
    Chapter 2 Security for Whom? The Shifting Security Assumptions of Pervasive Computing
  4. Altmetric Badge
    Chapter 3 Active Authentication for Pervasive Computing Environments
  5. Altmetric Badge
    Chapter 4 A Survey of Peer-to-Peer Security Issues
  6. Altmetric Badge
    Chapter 5 Autonomous Nodes and Distributed Mechanisms
  7. Altmetric Badge
    Chapter 6 Privacy in Sensor Webs and Distributed Information Systems
  8. Altmetric Badge
    Chapter 7 Negotiated Privacy
  9. Altmetric Badge
    Chapter 8 SoftwarePot: An Encapsulated Transferable File System for Secure Software Circulation
  10. Altmetric Badge
    Chapter 9 Fail-Safe ANSI-C Compiler: An Approach to Making C Programs Secure Progress Report
  11. Altmetric Badge
    Chapter 10 Types and Effects for Non-interfering Program Monitors
  12. Altmetric Badge
    Chapter 11 Flexible and Efficient Sandboxing Based on Fine-Grained Protection Domains
  13. Altmetric Badge
    Chapter 12 Enforcing Java Run-Time Properties Using Bytecode Rewriting
  14. Altmetric Badge
    Chapter 13 AnZenMail: A Secure and Certified E-mail System
  15. Altmetric Badge
    Chapter 14 Formalization and Verification of a Mail Server in Coq
  16. Altmetric Badge
    Chapter 15 Design and Implementation of Security System Based on Immune System
  17. Altmetric Badge
    Chapter 16 Design and Implementation of Access Control System for Smart Office Environment
  18. Altmetric Badge
    Chapter 17 Typing One-to-One and One-to-Many Correspondences in Security Protocols
  19. Altmetric Badge
    Chapter 18 Proof-Carrying Code with Untrusted Proof Rules
  20. Altmetric Badge
    Chapter 19 Verification of Authentication Protocols Based on the Binding Relation
  21. Altmetric Badge
    Chapter 20 Hiding Names: Private Authentication in the Applied Pi Calculus
  22. Altmetric Badge
    Chapter 21 Environmental Requirements for Authentication Protocols
  23. Altmetric Badge
    Chapter 22 A Comparison between Strand Spaces and Multiset Rewriting for Security Protocol Analysis
  24. Altmetric Badge
    Chapter 23 Data Access Specification and the Most Powerful Symbolic Attacker in MSR
  25. Altmetric Badge
    Chapter 24 A Logical Verification Method for Security Protocols Based on Linear Logic and BAN Logic
  26. Altmetric Badge
    Chapter 25 Formal Analysis of the iKP Electronic Payment Protocols
  27. Altmetric Badge
    Chapter 26 CafeOBJ as a Tool for Behavioral System Verification
Attention for Chapter 14: Formalization and Verification of a Mail Server in Coq
Altmetric Badge

Mentioned by

twitter
1 X user

Citations

dimensions_citation
2 Dimensions

Readers on

mendeley
5 Mendeley
You are seeing a free-to-access but limited selection of the activity Altmetric has collected about this research output. Click here to find out more.
Chapter title
Formalization and Verification of a Mail Server in Coq
Chapter number 14
Book title
Software Security — Theories and Systems
Published in
Lecture notes in computer science, June 2003
DOI 10.1007/3-540-36532-x_14
Book ISBNs
978-3-54-000708-1, 978-3-54-036532-7
Authors

Reynald Affeldt, Naoki Kobayashi, Affeldt, Reynald, Kobayashi, Naoki

Editors

Mitsuhiro Okada, Benjamin C. Pierce, Andre Scedrov, Hideyuki Tokuda, Akinori Yonezawa

X Demographics

X Demographics

The data shown below were collected from the profile of 1 X user who shared this research output. Click here to find out more about how the information was compiled.
Mendeley readers

Mendeley readers

The data shown below were compiled from readership statistics for 5 Mendeley readers of this research output. Click here to see the associated Mendeley record.

Geographical breakdown

Country Count As %
United States 1 20%
Unknown 4 80%

Demographic breakdown

Readers by professional status Count As %
Student > Ph. D. Student 3 60%
Student > Bachelor 1 20%
Other 1 20%
Readers by discipline Count As %
Computer Science 5 100%
Attention Score in Context

Attention Score in Context

This research output has an Altmetric Attention Score of 1. This is our high-level measure of the quality and quantity of online attention that it has received. This Attention Score, as well as the ranking and number of research outputs shown below, was calculated when the research output was last mentioned on 20 May 2016.
All research outputs
#15,374,585
of 22,873,031 outputs
Outputs from Lecture notes in computer science
#4,647
of 8,127 outputs
Outputs of similar age
#43,923
of 48,804 outputs
Outputs of similar age from Lecture notes in computer science
#26
of 29 outputs
Altmetric has tracked 22,873,031 research outputs across all sources so far. This one is in the 22nd percentile – i.e., 22% of other outputs scored the same or lower than it.
So far Altmetric has tracked 8,127 research outputs from this source. They receive a mean Attention Score of 5.0. This one is in the 27th percentile – i.e., 27% of its peers scored the same or lower than it.
Older research outputs will score higher simply because they've had more time to accumulate mentions. To account for age we can compare this Altmetric Attention Score to the 48,804 tracked outputs that were published within six weeks on either side of this one in any source. This one is in the 5th percentile – i.e., 5% of its contemporaries scored the same or lower than it.
We're also able to compare this research output to 29 others from the same source and published within six weeks on either side of this one. This one is in the 10th percentile – i.e., 10% of its contemporaries scored the same or lower than it.