Costantino, G., Martinelli, F. & Santi, P (2012). Privacy-Preserving Interest-Casting in Opportunistic Networks. In IEEE Wireless Communications and Networking Conference (WCNC 2012). IEEE.[More][Bibtex]
Wirsing, M., Eckhardt, J., M\, T. & Meseguer, J (2012). Design and Analysis of Cloud-Based Architectures with KLAIM and Maude. In Proc. 9th International Workshop on Rewriting Logic and its Applications (WRLA 2012).[More][Bibtex]
Huygens, C. (2012). Supporting Heterogeneity of Stakeholders in Low-Resource Networked Systems (Ondersteuning voor diversiteit van belanghebbenden in genetwerkte systemen met beperkte middelen). Phd Thesis.[More][Online version][Bibtex]
Decat, M., Lagaisse, B. & Joosen, W (2012). Federated Authorization for SaaS applications. In Doctoral Symposium of ESSoS 12, pages 43-48. CEUR Workshop Proceedings.[More][Online version][Bibtex]
Nguyen, B. T., Sprenger, C. & Basin, D (2012). Attack-preserving security protocol transformations. In Proceedings of the Doctoral Symposium of International Symposium on Engineering Secure Software and Systems (ESSoS-DS), Eindhoven.[More][Bibtex]
Moyano, F., Fernandez-Gago, C., Agudo, I. & Lopez, J (2012). A Task Ordering Approach for Automatic Trust Establishment. In Proceedings of the 2012 International Symposium on Engineering Secure Software and Systems (ESSoS 2012), pages 76-89. Eindhoven, The Netherlands : Springer.[More][Bibtex]
Buyens, K. (2012). Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen). Phd Thesis, IBBTNESSoS.[More][Online version][Bibtex]
Costa, G. & Matteucci, I. (2012). Gate automata-driven run-time enforcement. Computers & Mathematics with Applications, 63(2), 518-524.[More][Bibtex]
Nguyen, V. H. & Massacci, F (2012). An Independent Validation of Vulnerability Discovery Models. In Proceeding of the 7th ACM Symposium on Information, Computer and Communications Security.[More][Bibtex]
Brændeland, G., Refsdal, A. & Stølen, K (2012). A Denotational Model for Component-Based Risk Analysis. In Formal Aspects of Component Software, pages 12-41. Springer.[More][Bibtex]
Allodi, L (2012). The dark side of vulnerability exploitation: a research proposal. In Proceedings of the 2012 ESSoS Conference Doctoral Symposium.[More][Bibtex]
Shim, W., Allodi, L. & Massacci, F (2012). Crime Pays if You Are Only an Average Hacker. In Proceedings of IEEE/ASE 2012 Cyber Security Conference.[More][Bibtex]
Sergey, I. (2012). Operational Aspects of Type Systems: Inter-Derivable Semantics of Type Checking and Gradual Types for Object Ownership. Phd Thesis.[More][Online version][Bibtex]
Rios, R. & Lopez, J (2012). Adecuacion de soluciones de anonimato al problema de la privacidad de localización de sensores. In Zurutuza, U., Uribeetxeberria, R. & Arenaza-Nuño, I. (editors), XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012), pages 309-314.[More][Bibtex]
Büttner, F., Egea, M., Cabot, J. & Gogolla, M (2012). Verification of ATL Transformations Using Transformation Models and Model Finders. In Aoki, T. & Taguchi, K. (editors), Formal Methods and Software Engineering - 14th International Conference on Formal Engineering Methods, ICFEM 2012, Kyoto, Japan, November 12-16, 2012. Proceedings, pages 198-213. Springer.[More][Bibtex]
Lekies, S., Nikiforakis, N., Tighzert, W., Piessens, F. & Johns, M (2012). DEMACRO: Defense against Malicious Cross-domain Requests. In Research in Attacks, Intrusions and Defenses, pages 254-273. Springer Verlag.[More][Bibtex]
Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C. J., Levchenko, K. et al (2012). Manufacturing compromise: the emergence of exploit-as-a-service. In Yu, T., Danezis, G. & Gligor, V. D. (editors), ACM Conference on Computer and Communications Security, pages 821-832. ACM.[More][Bibtex]
Costantino, G., Martinelli, F., Santi, P. & Amoruso, D (2012). An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast. In PST, pages 9-16.[More][Bibtex]
Anantharaman, S., Bouchard, C., Narendran, P. & Rusinowitch, M (2012). Unification Modulo Chaining. In Language and Automata Theory and Applications - 6th International Conference, LATA 2012, A Coruña, Spain, March 5-9, 2012. Proceedings, pages 70-82.[More][Bibtex]
Marcus, P. & Linnhoff-Popien, C (2012). Efficient Evaluation of Location Predicates for Access Control Systems. In Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation (EMS) 2012, pages 385-390.[More][Bibtex]
Barthe, G., Pointcheval, D. & Béguelin, S. Z (2012). Verified security of redundancy-free encryption from Rabin and RSA. In Yu, T., Danezis, G. & Gligor, V. D. (editors), ACM Conference on Computer and Communications Security, pages 724-735. ACM.[More][Bibtex]
Almeida, J. B., Barbosa, M., Bangerter, E., Barthe, G., Krenn, S. & Béguelin, S. Z (2012). Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols. In Yu, T., Danezis, G. & Gligor, V. D. (editors), ACM Conference on Computer and Communications Security, pages 488-500. ACM.[More][Bibtex]
Beckers, K (2012). Comparing Privacy Requirements Engineering Approaches. In Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 6th International Workshop on Secure Software Engineering (SecSE 2012), pages 574-581. IEEE Computer Society.[More][Online version][Bibtex]
Beckers, K., Heisel, M., Faßbender, S. & Schmidt, H (2012). Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. In Proceedings of the International Conference on Availability, Reliability and Security (ARES), pages 243-248. IEEE Computer Society.[More][Online version][Bibtex]
Beckers, K., Faßbender, S., Heisel, M. & Meis, R (2012). A Problem-based Approach for Computer Aided Privacy Threat Identification. In Privacy Forum 2012. Springer.[More][Online version][Bibtex]