Home Publications

Publications

Filter:
 

Year: 2014

  • Rafique, M. Z., Huygens, C. & Caballero, J. (2014). Network Dialog Minimization and Network Dialog Diffing: Two Novel Primitives for Network Security Applications. Madrid, Spain, IMDEA Software Institute. [More] [Bibtex]
  • Devriese, D. (2014). Functional Techniques for Representing and Specifying Software (Functionele technieken voor het voorstellen en specifiëren van software). Phd Thesis, KU Leuven. [More] [Online version] [Bibtex]
  • Scandariato, R., Wuyts, K. & Joosen, W. (2014). A descriptive study of Microsoft's threat modeling technique. Requirements Engineering. [More] [Online version] [Bibtex]
  • Scandariato, R., Paci, F., Tran, L. M., Labunets, K., Yskout, K., Massacci, F. et al (2014). Empirical Assessment of Security Requirements and Architecture: Lessons Learned. [More] [Bibtex]
  • Heissel, M., Joosen, W., Lopez, J. & Martinelli, F. (2014). dvances in Engineering Secure Future Internet Services and Systems. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Beckers, K., Heissel, M., Solhaug, B. & Stølen, K (2014). ISMS-CORAS: A Structutred Method for Establishing an ISO 27001 Compliant Information Security Management System, chapter 13, pages 353-374. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Egea, M. & Bütner, F (2014). Verification of Authorization Policies modified by Delegation, chapter 12, pages 293-322. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Bertolino, A., Traon, Y. L., Lonetti, F., Marchetti, E. & Mouelhi, T (2014). Validation of Access Control Systems, chapter 9, pages 214-238. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Pathak, A., Rosca, G., Issarny, V., Decat, M. & Lagaisse, B (2014). Privacy and Access Control in Federated Social Networks, chapter 7, pages 162-181. Springer Berlin / Heidelberg Berlin / Heidelberg. [More] [Bibtex]
  • Martin, J. A., Martinelli, F., Mateucci, I., Pimentel, E. & Turuani, M (2014). On the Synthesis of Secure Services Composition, chapter 6. Springer Berlin / Heidelberg Berlin / Heidelberg. [More] [Bibtex]
  • de Dios, M. A., Dania, C., Basin, D. & Clavel, M (2014). Model-driven Development of a Secure eHealth Application, chapter 4. Springer Berlin / Heidelberg Berlin / Heidelberg. [More] [Bibtex]
  • Martinelli, F. & Matteucci, I (2014). Partial Model Checking for the Verification and Synthesis of Secure Service Compositions. In Public Key Infrastructures, Services and Applications, pages 1-11. Springer. [More] [Bibtex]
  • Conti, R., Lunardelli, A., Matteucci, I., Mori, P. & Petrocchi, M (2014). Preserving Data Privacy in eHealth. Springer. [More] [Bibtex]
  • Conti, R., Matteucci, I., Mori, P. & Petrocchi, M (2014). An expertise-driven authoring tool for e-Health data policies. In CBMS. IEEE. [More] [Online version] [Bibtex]
  • Nguyen, V. H. (2014). Empirical methods for evaluating empirical vulnerability models. Phd Thesis, University of Trento. [More] [Bibtex]
  • Scandariato, R., Nguyen, V. H., Massacci, F. & Joosen, W. (2014). Evaluating Text Features as Predictors of Security Vulnerabilities, University of Leuven, University of Trento. [More] [Bibtex]
  • Tran, L. M. (2014). Managing the uncertainty of the evolution of requirements models. Phd Thesis, University of Trento. [More] [Bibtex]
  • Tran, L. M. & Massacci, F. (2014). An Approach for Decision Support on the Uncertainty in Feature Model Evolution, University of Trento. [More] [Bibtex]
  • Ciancia, V., Martinelli, F., Matteucci, I., Petrocchi, M., Martin, J. & Pimentel, E. (2014). Automated synthesis and ranking of secure BPMN orchestrators. International Journal of Secure Software Engineering (IJSSE). [More] [Bibtex]
  • Refsdal, A., Rideng, Ø., Solhaug, B. & Stølen, K (2014). Divide and conquer - Towards a notion of risk encapsulation. In Advances in Engineering Secure Future Internet Services and Systems. Springer. [More] [Bibtex]
  • Beckers, K., Heisel, M., Solhaug, B. & Stolen, K (2014). ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. In In Advances in Engineering Secure Future Internet Services and Systems. Springer. [More] [Bibtex]
  • Moyano, F., Baudry, B., Fernandez-Gago, C. & Lopez, J (2014). Engineering Trust-Awareness and Self-Adpatability in Services and Systems, chapter 8. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Malkis, A. & Banerjee, A. (2014). On Automation in the Verification of Software Barriers: Experience Report. J. Autom. Reasoning, 52(3), 275-329. [More] [Bibtex]
  • Itzhaky, S., Banerjee, A., Immerman, N., Lahav, O., Nanevski, A. & Sagiv, M (2014). Modular reasoning about heap paths via effectively propositional formulas. In Jagannathan, S. & Sewell, P. (editors), POPL, pages 385-396. ACM. [More] [Bibtex]
  • Ryck, P. D., Desmet, L., Piessens, F. & Joosen, W (2014). Eradicating Bearer Tokens for Session Management. In W3C/IAB workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). [More] [Bibtex]
Results 1 - 25 of 353
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>