Home Publications



Year: 2013

  • Barthe, G., Crespo, J. M., Gulwani, S., Kunz, C. & Marron, M (2013). From relational verification to SIMD loop synthesis. In Nicolau, A., Shen, X., Amarasinghe, S. P. & Vuduc, R. (editors), ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, PPoPP '13, Shenzhen, China, February 23-27, 2013, pages 123-134. ACM. [More] [Bibtex]
  • Barthe, G., Crespo, J. M. & Kunz, C (2013). Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification. In Artëmov, S. N. & Nerode, A. (editors), Logical Foundations of Computer Science, International Symposium, LFCS 2013, San Diego, CA, USA, January 6-8, 2013. Proceedings, pages 29-43. Springer. [More] [Bibtex]
  • Tran, L. M (2013). Early Dealing with Evolving Risks in Software Systems. In The 3rd International Workshop on Information Systems Security Engineering (WISSE'13). [More] [Bibtex]
  • Ligaarden, O. (2013). A Framework for Analyzing and Monitoring the Impact of Dependencies on Quality. Phd Thesis, University of Oslo. [More] [Bibtex]
  • Tran, L. M. & Massacci, F (2013). UNICORN: A Tool for Modeling and Reasoning on the Uncertainty of Requirements Evolutions. In Proceedings of Caise 2013. [More] [Bibtex]
  • Beckers, K., Côté, I., Hatebur, D., Bender, S. F. & Heisel, M (2013). Common Criteria CompliAnt Software Development (CC-CASD). In Proceedings 28th Symposium on Applied Computing, pages 1298-1304. New York, NY, USA : ACM. [More] [Bibtex]
  • Polla, M. L., Martinelli, F. & Sgandurra, D. (2013). A Survey on Security for Mobile Devices. IEEE Communications Surveys and Tutorials, 15(1), 446-471. [More] [Bibtex]
  • Egea, M., Paci, F., Petrocchi, M. & Zannone, N (2013). PERSONA: A Personalized DataProtection Framework. In 7th IFIP WG 11.11 International Conference on Trust Management, pages 272-280. [More] [Bibtex]
  • Lunardelli, A., Matteucci, I., Mori, P. & Petrocchi, M (2013). A Prototype for Solving Conflicts in XACML-based e-Health Policies. In 26th IEEE International Symposium on Computer-Based Medical Systems (CBMS 2013). [More] [Bibtex]
  • Nguyen, B. T. & Sprenger, C (2013). Sound Security Protocol Transformations. In Principles of Security and Trust - Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings, pages 83-104. Springer. [More] [Bibtex]
  • Bertolino, A., Busch, M., Daoudagh, S., Koch, N., Lonetti, F. & Marchetti, E (2013). A Toolchain for Designing and Testing XACML Policies. In Proceedings of ICST 2013 (Poster). [More] [Bibtex]
  • Bertolino, A., Daoudagh, S., Lonetti, F. & Marchetti., E (2013). XACMUT: XACML 2.0 Mutants Generator. In IEEE (editor), Software Testing, Verification and Validation Workshops (ICSTW), 2013 IEEE Sixth International Conference on, pages 28-33. [More] [Bibtex]
  • Alcaraz, C. & Lopez, J. (2013). Wide-Area Situational Awareness for Critical Infrastructure Protection. IEEE Computer, 46(4), 30-37. [More] [Bibtex]
  • Backes, M., Doychev, G. & Köpf, B (2013). Preventing Side-Channel Leaks in Web Traffic: A Formal Approach. In Proc. 20th Network and Distributed Systems Security Symposium (NDSS), to appear. Internet Society. [More] [Bibtex]
  • Karopoulos, G., Mori, P. & Martinelli, F. (2013). Usage control in SIP-based multimedia delivery. Computers & Security, 39, 406-418. [More] [Bibtex]
  • Costantino, G. & Sgandurra, D (2013). How to Grant Less Permissions to Facebook Applications. In. [More] [Bibtex]

Year: 2012

  • Decat, M., Lagaisse, B. & Joosen, W (2012). Toward efficient and confidentiality-aware federation of access control policies. In Proceedings of the 7th Workshop on Middleware for Next Generation Internet Computing, pages 4:1-4:6. ACM. [More] [Online version] [Bibtex]
  • Vogels, F. (2012). Formalisation and Soundness of Static Verification Algorithms for Imperative Programs (Formalisatie en correctheid van statische verificatiealgoritmes voor imperatieve programmatextquotesingles). Phd Thesis. [More] [Online version] [Bibtex]
  • Agten, P., Acker, S. V., Brondsema, Y., Phung, P. H., Desmet, L. & Piessens, F (2012). JSand: Complete client-side sandboxing of third-party JavaScript without browser modifications. In Proceedings of the 28th Annual Computer Security Applications Conference (ACSAC 2012), pages 1-10. ACM. [More] [Online version] [Bibtex]
  • Dini, G., Martinelli, F., Matteucci, I., Petrocchi, M., Saracino, A. & Sgandurra, D (2012). A Multi-Criteria Based Evaluation of Android Applications. In Proceedings of 4th Intl. Conference on Trusted Systems (InTrust2012). Springer. [More] [Online version] [Bibtex]
  • Avanesov, T., Chevalier, Y., Rusinowitch, M. & Turuani, M (2012). Towards the Orchestration of Secured Services under Non-disclosure Policies. In Computer Network Security - 6th International Conference on Mathematical Methods, Models and Architectures for Computer Network Security, MMM-ACNS 2012, St. Petersburg, Russia, October 17-19, 2012. Proceedings, pages 130-145. [More] [Bibtex]
  • Nikiforakis, N., Invernizzi, L., Kapravelos, A., Acker, S. V., Joosen, W., Kruegel, C. et al (2012). You are what you include: Large-scale evaluation of remote JavaScript inclusions. In Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), pages 736-747. [More] [Online version] [Bibtex]
  • Strackx, R. & Piessens, F (2012). Fides: Selectively hardening software application components against kernel-level or process-level malware. In Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), pages 2-13. ACM Press. [More] [Online version] [Bibtex]
  • Ciancia, V., Martin, A., Martinelli, F., Matteucci, I., Petrocchi, M. & Pimentel, E (2012). A tool for the synthesis of secure orchestrators. In Proceedings of Model-Driven Security Workshop (MDSec2012). ACM-DL. [More] [Online version] [Bibtex]
  • Reynaert, T., Groef, W. D., Devriese, D., Desmet, L. & Piessens, F (2012). PESAP: a Privacy enhanced social application platform. In International Workshop on Security and Privacy in Social Networks (SPSN), pages 827-833. IEEE Computer Society. [More] [Online version] [Bibtex]
Results 126 - 150 of 353
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>