Home Publications

Publications

Filter:
 

Year: 2012

  • Costantino, G., Martinelli, F., Santi, P. & Amoruso, D (2012). An implementation of secure two-party computation forsmartphones with application to privacy-preserving interest-cast. In MOBICOM, pages 447-450. [More] [Bibtex]
  • Pietro, R. D., Martinelli, F. & Verde, N. V (2012). Broadcast Authentication for Resource Constrained Devices: A Major Pitfall and Some Solutions. In IEEE symposium on Reliable Distributed Systems (SRDS), pages 213-218. IEEE Computer Society. [More] [Bibtex]
  • Drábik, P., Martinelli, F. & Morisset, C (2012). A Quantitative Approach for Inexact Enforcement ofSecurity Policies. In ISC, pages 306-321. [More] [Bibtex]
  • Martinelli, F., Matteucci, I. & Morisset, C (2012). From qualitative to quantitative enforcement of security policy. In Proceedings of the 6th international conference on Mathematical Methods, Models and Architectures for Computer Network Security: computer network security, pages 22-35. Springer-Verlag. [More] [Bibtex]
  • Costa, G., Degano, P. & Martinelli, F. (2012). Modular plans for secure service composition. Journal of Computer Security, 20(1), 81-117. [More] [Bibtex]
  • Lazouski, A., Mancini, G., Martinelli, F. & Mori, P (2012). Usage control in cloud systems. In Savage, N., Assad, S. E. & Shoniregun, C. A. (editors), 7th International Conference for Internet Technology and Secured Transactions, (ICITST 2012), pages 202-207. Infonomics Society. [More] [Bibtex]
  • Costantino, G., Martinelli, F. & Petrocchi, M (2012). A study on rating services based on users' category. In Intl. Conference on Internet and Web Applications and Services, pages 188-193. [More] [Bibtex]
  • Martinelli, F., Matteucci, I., Petrocchi, M. & Wiegand, L (2012). A Formal Support for Collaborative Data Sharing. In CD-ARES, pages 547-561. [More] [Bibtex]
  • Groef, W. D., Devriese, D., Nikiforakis, N. & Piessens, F (2012). FlowFox: a web browser with flexible and precise information flow control. In Proceedings of the 19th ACM conference on Computer and Communications Security (CCS 2012), pages 748-759. ACM. [More] [Online version] [Bibtex]
  • Erdogan, G., Seehusen, F., Stolen, K. & Aagedal, J (2012). Assessing the usefulness of testing for validating the correctness of security risk models based on an industrial case study. In International Workshop on Quantitative Aspects in Security Assurance (QASA'12). [More] [Bibtex]
  • Massacci, F., Paci, F., Nagaraj, D., Tran, L. M. & Tedeschi, A (2012). Assessing a Requirements Evolution Approach: A Family of Empirical Studies in the Air Traffic Management Domain.In proceedings of International Workshop on Empirical Requirements Engineering, Chicago, Illinois,USA. In Proceedings of International Workshop on Empirical Requirements Engineering 2012. [More] [Bibtex]
  • Büttner, F., Egea, M. & Cabot, J (2012). On the verification of ATL transformations using “off-the-shelf” SMT solvers. In France, R., Kazmeier, J., Atkinson, C. & Breu, R. (editors), Model Driven Engineering Languages and Systems, 15th Int. Conf., MODELS 2012. Innsbruck, Austria. [More] [Bibtex]
  • Massacci, F. & Paci, F (2012). How to Select a Security Requirements Method? A comparative study with students and practitioners.. In Proceedings of 17th Nordic Conference on Secure IT Systems, NORDSEC 2012. [More] [Bibtex]
  • Ligaarden, O. S., Refsdal, A. & Stolen, K (2012). Using Indicators to Monitor Security Risk in Systems of Systems: How to Capture and Measure the Impact of Service Dependencies on the Security of Provided Service. In Mellado, D., Sanchez, L. E., Fern, E., Ez-Medina & Piattini, M. (editors), IT Security Governance Innovations: Theory and Research. IGI Global. [More] [Bibtex]
  • Ligaarden, O. S., Refsdal, A. & Stolen, K. (2012). Designing Indicators to Monitor the Fulfillment of Business Objectives with Particular Focus on Quality and ICT-supported Monitoring of Indicators. International Journal on Advances in Intelligent Systems, 5(1--2), 175-193. [More] [Bibtex]
  • Beckers, K., Faßbender, S., Heisel, M. & Meis, R (2012). Pattern-based Context Establishment for Service-Oriented Architectures. In Software Service and Application Engineering, pages 81-101. Springer. [More] [Bibtex]
  • Schwittek, W., Schmidt, H., Beckers, K., Eicker, S., Faßbender, S. & Heisel, M (2012). A Common Body of Knowledge for Engineering Secure Software and Services. In Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 1st International Workshop on Security Ontologies and Taxonomies (SecOnT 2012), pages 499-506. IEEE Computer Society. [More] [Bibtex]
  • Beckers, K., Faßbender, S. & Schmidt, H (2012). An integrated Method for Pattern-based Elicitation of Legal Requirements applied to a Cloud Computing Example. In Proceedings of the International Conference on Availability, Reliability and Security (ARES) - 2nd International Workshop on Resilience and IT-Risk in Social Infrastructures (RISI 2012), pages 463-472. IEEE Computer Society. [More] [Bibtex]
  • Beckers, K. & Heisel, M (2012). A Foundation for Requirements Analysis of Privacy Preserving Software. In Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012), pages 1-16. Springer. [More] [Bibtex]
  • Beckers, K., Eicker, S., Faßbender, S., Heisel, M., Schmidt, H. & Schwittek, W (2012). Ontology-Based Identification of Research Gaps and Immature Research Areas. In Proceedings of the International Cross Domain Conference and Workshop (CD-ARES 2012), pages 93-107. Springer. [More] [Bibtex]
  • Valdazo, J. (2012). Developing Secure Business Applications from Secure BPMN Models. Master Thesis, Universidad Complutense de Madrid, Spain. [More] [Bibtex]
  • David, O.-N. & Baudry, B (2012). Toward a Model-driven Access-control Enforcement Mechanism for Pervasive Systems. In 1st Model-Driven Security Workshop (MDSEC). Innsbruck, Austria. [More] [Bibtex]
  • Matteucci, I., Mori, P. & Petrocchi, M (2012). Prioritized Execution of Privacy Policies. In Proceedings of the 7th International Workshop on Data Privacy Management (DPM2012). Springer. [More] [Online version] [Bibtex]
  • Lazouski, A., Martinelli, F. & Mori, P (2012). A Prototype for Enforcing Usage Control Policies Based on XACML. In Proceedings of the 9th International Conference on Trust, Privacy and Security in Digital Business (TrustBus'12), pages 79-92. Springer-Verlag. [More] [Bibtex]
  • Karopoulos, G., Mori, P. & Martinelli, F (2012). Continuous Authorizations in SIP with Usage Control. In Proceedings of the 20th Euromicro International Conference on Parallel, Distributed and Network-Based Computing (PDP2012), pages 283-287. IEEE Computer Society. [More] [Bibtex]
Results 201 - 225 of 353
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>