Home Publications

Publications

Filter:
 

Year: 2012

  • Costantino, G., Martinelli, F. & Santi, P (2012). Privacy-Preserving Interest-Casting in Opportunistic Networks. In IEEE Wireless Communications and Networking Conference (WCNC 2012). IEEE. [More] [Bibtex]
  • Wirsing, M., Eckhardt, J., M\, T. & Meseguer, J (2012). Design and Analysis of Cloud-Based Architectures with KLAIM and Maude. In Proc. 9th International Workshop on Rewriting Logic and its Applications (WRLA 2012). [More] [Bibtex]
  • Huygens, C. (2012). Supporting Heterogeneity of Stakeholders in Low-Resource Networked Systems (Ondersteuning voor diversiteit van belanghebbenden in genetwerkte systemen met beperkte middelen). Phd Thesis. [More] [Online version] [Bibtex]
  • Decat, M., Lagaisse, B. & Joosen, W (2012). Federated Authorization for SaaS applications. In Doctoral Symposium of ESSoS 12, pages 43-48. CEUR Workshop Proceedings. [More] [Online version] [Bibtex]
  • Nguyen, B. T., Sprenger, C. & Basin, D (2012). Attack-preserving security protocol transformations. In Proceedings of the Doctoral Symposium of International Symposium on Engineering Secure Software and Systems (ESSoS-DS), Eindhoven. [More] [Bibtex]
  • Moyano, F., Fernandez-Gago, C., Agudo, I. & Lopez, J (2012). A Task Ordering Approach for Automatic Trust Establishment. In Proceedings of the 2012 International Symposium on Engineering Secure Software and Systems (ESSoS 2012), pages 76-89. Eindhoven, The Netherlands : Springer. [More] [Bibtex]
  • Buyens, K. (2012). Analyzing Software Architectures for Least Privilege Violations (Het identificeren van schendingen tegen het principe van minst privilege in software architecturen). Phd Thesis, IBBTNESSoS. [More] [Online version] [Bibtex]
  • Costa, G. & Matteucci, I. (2012). Gate automata-driven run-time enforcement. Computers & Mathematics with Applications, 63(2), 518-524. [More] [Bibtex]
  • Nguyen, V. H. & Massacci, F (2012). An Independent Validation of Vulnerability Discovery Models. In Proceeding of the 7th ACM Symposium on Information, Computer and Communications Security. [More] [Bibtex]
  • Brændeland, G., Refsdal, A. & Stølen, K (2012). A Denotational Model for Component-Based Risk Analysis. In Formal Aspects of Component Software, pages 12-41. Springer. [More] [Bibtex]
  • Allodi, L (2012). The dark side of vulnerability exploitation: a research proposal. In Proceedings of the 2012 ESSoS Conference Doctoral Symposium. [More] [Bibtex]
  • Shim, W., Allodi, L. & Massacci, F (2012). Crime Pays if You Are Only an Average Hacker. In Proceedings of IEEE/ASE 2012 Cyber Security Conference. [More] [Bibtex]
  • Sergey, I. (2012). Operational Aspects of Type Systems: Inter-Derivable Semantics of Type Checking and Gradual Types for Object Ownership. Phd Thesis. [More] [Online version] [Bibtex]
  • Rios, R. & Lopez, J (2012). Adecuacion de soluciones de anonimato al problema de la privacidad de localización de sensores. In Zurutuza, U., Uribeetxeberria, R. & Arenaza-Nuño, I. (editors), XII Reunión Española sobre Criptología y Seguridad de la Información (RECSI 2012), pages 309-314. [More] [Bibtex]
  • Büttner, F., Egea, M., Cabot, J. & Gogolla, M (2012). Verification of ATL Transformations Using Transformation Models and Model Finders. In Aoki, T. & Taguchi, K. (editors), Formal Methods and Software Engineering - 14th International Conference on Formal Engineering Methods, ICFEM 2012, Kyoto, Japan, November 12-16, 2012. Proceedings, pages 198-213. Springer. [More] [Bibtex]
  • Lekies, S., Nikiforakis, N., Tighzert, W., Piessens, F. & Johns, M (2012). DEMACRO: Defense against Malicious Cross-domain Requests. In Research in Attacks, Intrusions and Defenses, pages 254-273. Springer Verlag. [More] [Bibtex]
  • Grier, C., Ballard, L., Caballero, J., Chachra, N., Dietrich, C. J., Levchenko, K. et al (2012). Manufacturing compromise: the emergence of exploit-as-a-service. In Yu, T., Danezis, G. & Gligor, V. D. (editors), ACM Conference on Computer and Communications Security, pages 821-832. ACM. [More] [Bibtex]
  • Costantino, G., Martinelli, F., Santi, P. & Amoruso, D (2012). An implementation of secure two-party computation for smartphones with application to privacy-preserving interest-cast. In PST, pages 9-16. [More] [Bibtex]
  • Anantharaman, S., Bouchard, C., Narendran, P. & Rusinowitch, M (2012). Unification Modulo Chaining. In Language and Automata Theory and Applications - 6th International Conference, LATA 2012, A Coruña, Spain, March 5-9, 2012. Proceedings, pages 70-82. [More] [Bibtex]
  • Marcus, P. & Linnhoff-Popien, C (2012). Efficient Evaluation of Location Predicates for Access Control Systems. In Sixth UKSim/AMSS European Symposium on Computer Modeling and Simulation (EMS) 2012, pages 385-390. [More] [Bibtex]
  • Barthe, G., Pointcheval, D. & Béguelin, S. Z (2012). Verified security of redundancy-free encryption from Rabin and RSA. In Yu, T., Danezis, G. & Gligor, V. D. (editors), ACM Conference on Computer and Communications Security, pages 724-735. ACM. [More] [Bibtex]
  • Almeida, J. B., Barbosa, M., Bangerter, E., Barthe, G., Krenn, S. & Béguelin, S. Z (2012). Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols. In Yu, T., Danezis, G. & Gligor, V. D. (editors), ACM Conference on Computer and Communications Security, pages 488-500. ACM. [More] [Bibtex]
  • Beckers, K (2012). Comparing Privacy Requirements Engineering Approaches. In Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 6th International Workshop on Secure Software Engineering (SecSE 2012), pages 574-581. IEEE Computer Society. [More] [Online version] [Bibtex]
  • Beckers, K., Heisel, M., Faßbender, S. & Schmidt, H (2012). Using Security Requirements Engineering Approaches to Support ISO 27001 Information Security Management Systems Development and Documentation. In Proceedings of the International Conference on Availability, Reliability and Security (ARES), pages 243-248. IEEE Computer Society. [More] [Online version] [Bibtex]
  • Beckers, K., Faßbender, S., Heisel, M. & Meis, R (2012). A Problem-based Approach for Computer Aided Privacy Threat Identification. In Privacy Forum 2012. Springer. [More] [Online version] [Bibtex]
Results 176 - 200 of 353
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>