Köpf, B., Mauborgne, L. & Ochoa, M (2012). Automatic Quantification of Cache Side-Channels. In Madhusudan, P. & Seshia, S. A. (editors), CAV, pages 564-580. Springer.[More][Bibtex]
Caballero, J., Grieco, G., Marron, M. & Nappa, A (2012). Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities. In Heimdahl, M. P. & Su, Z. (editors), ISSTA, pages 133-143. ACM.[More][Bibtex]
Barthe, G., Grégoire, B., Heraud, S., Olmedo, F. & Béguelin, S. Z (2012). Verified Indifferentiable Hashing into Elliptic Curves. In Degano, P. & Guttman, J. D. (editors), POST, pages 209-228. Springer.[More][Bibtex]
Frau, S. & Torabi Dashti, M (2012). Analysis of Communicating Authorization Policies. In 8th International Workshop on Security and Trust Management (STM 2012).[More][Bibtex]
Busch, M. & Ángel García de Dios, M. (2012). ActionUWE: Transformation of UWE to ActionGUI Models, Ludwig-Maximilians-Universität München.[More][Bibtex]
Busch, M., Koch, N., Masi, M., Pugliese, R. & Tiezzi, F (2012). Towards Model-Driven Development of Access Control Policies for Web Applications. In First Workshop on Model-Driven Security (MDsec 2012) on the 15th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2012). ACMDL.[More][Bibtex]
Combemale, B., Thirioux, X. & Baudry, B (2012). Formally Defining and Iterating Infinite Models. In Proceedings of the International Conference on Model Driven Engineering Languages and Systems (MODELS). Innsbruck, Austria.[More][Online version][Bibtex]
Omerovic, A., Kofod-Petersen, A., Solhaug, B., Svagård, I. & Tran, L. M. (2012). Report on ESUMS Risk Analysis, SINTEF ICT.[More][Bibtex]
Omerovic, A., Solhaug, B. & Stolen, K. (2012). Assessing Practical Usefulness and Performance of the PREDIQT Method: An Industrial Case Study. Information and Software Technology, 54, 1377-1395.[More][Bibtex]
Seehusen, F. & Solhaug, B (2012). Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures. In Multidisciplinary Research and Practice for Information Systems Series, pages 562-577. Springer.[More][Bibtex]
Dürr, M., Protschky, V. & Linnhoff-Popien, C (2012). Modeling Social Network Interaction Graphs. In Proceedings of The IEEE/ACM 2012 International Conference on Advances in Social Networks Analysis and Mining (Asonam 2012).[More][Bibtex]
Dürr, M., Maier, M. & Wiesner, K (2012). An Analysis of Query Forwarding Strategies for Secure and Privacy-Preserving Social Networks. In Proceedings of The IEEE/ACM 2012 International Conference on Advances in Social Networks Analysis and Mining (Asonam 2012).[More][Bibtex]
Sprenger, C. & Basin, D (2012). Refining key establishment. In Proc. 25th IEEE Computer Security Foundations Symposium (CSF).[More][Bibtex]
Najera, P., Roman, R. & Lopez, J (2012). Secure architecure for the integration of RFID and sensors in personal networks. In 7th International Workshop on Security and Trust Management (STM'11), pages 207-222. Copenhagen, Denmark : Springer.[More][Bibtex]
Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Martinelli, F. & Mori, P (2012). Testing of PolPA Authorization Systems. In In Proc. of 7th International Workshop on Automation of Software Test.[More][Bibtex]
Bartolini, C., Bertolino, A., Angelis, G. D., Ciancone, A. & Mirandola, R (2012). Non-Functional Analysis of Service Choreographies. In Proceedings of the 4th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS), 34th International Conference on Software Engineering (ICSE).[More][Bibtex]
Barthe, G., Köpf, B., Olmedo, F. & Béguelin, S. Z (2012). Probabilistic relational reasoning for differential privacy. In Field, J. & Hicks, M. (editors), Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012, pages 97-110.[More][Bibtex]
Beckers, K., Faßbender, S., Küster, J.-C. & Schmidt, H (2012). A Pattern-Based Method for Identifying and Analyzing Laws. In REFSQ, pages 256-262.[More][Bibtex]
Beckers, K., Faßbender, S., Heisel, M., Küster, J.-C. & Schmidt, H (2012). Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. In ESSoS, pages 14-21.[More][Bibtex]
Beckers, K (2012). Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering Approaches. In Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012, pages 65-70. CEUR-WS.org.[More][Bibtex]
Omerovic, A. (2012). PREDIQT: A Method for Model-based Prediction of Impacts of Architectural Design changes on System Quality. Phd Thesis, Faculty of Mathematics and Natural Sciences, University of Oslo.[More][Bibtex]
Solhaug, B. & Stolen, K (2012). Uncertainty, Subjectivity, Trust and Risk -- How it All Fits Together. In Proc. 7th International Workshop on Security and Trust Management (STM'11), pages 1-5. Springer.[More][Bibtex]
Ligaarden, O., Refsdal, A. & Stolen, K. (2012). Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis, SINTEF ICT.[More][Bibtex]
Erdogan, G. & Stolen, K (2012). Risk-driven Security Testing versus Test-driven Security Risk Analysis. In Proceedings of the first ESSoS Doctoral Symposium (ESSoS-DS 2012), pages 5-10.[More][Bibtex]
Ochoa, M (2012). Security Guarantees and Evolution: From models to reality. In Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012. CEUR-WS.org.[More][Bibtex]