Home Publications

Publications

Filter:
 

Year: 2012

  • Köpf, B., Mauborgne, L. & Ochoa, M (2012). Automatic Quantification of Cache Side-Channels. In Madhusudan, P. & Seshia, S. A. (editors), CAV, pages 564-580. Springer. [More] [Bibtex]
  • Caballero, J., Grieco, G., Marron, M. & Nappa, A (2012). Undangle: early detection of dangling pointers in use-after-free and double-free vulnerabilities. In Heimdahl, M. P. & Su, Z. (editors), ISSTA, pages 133-143. ACM. [More] [Bibtex]
  • Barthe, G., Grégoire, B., Heraud, S., Olmedo, F. & Béguelin, S. Z (2012). Verified Indifferentiable Hashing into Elliptic Curves. In Degano, P. & Guttman, J. D. (editors), POST, pages 209-228. Springer. [More] [Bibtex]
  • Frau, S. & Torabi Dashti, M (2012). Analysis of Communicating Authorization Policies. In 8th International Workshop on Security and Trust Management (STM 2012). [More] [Bibtex]
  • Busch, M. & Ángel García de Dios, M. (2012). ActionUWE: Transformation of UWE to ActionGUI Models, Ludwig-Maximilians-Universität München. [More] [Bibtex]
  • Busch, M., Koch, N., Masi, M., Pugliese, R. & Tiezzi, F (2012). Towards Model-Driven Development of Access Control Policies for Web Applications. In First Workshop on Model-Driven Security (MDsec 2012) on the 15th International Conference on Model Driven Engineering Languages and Systems (MoDELS 2012). ACMDL. [More] [Bibtex]
  • Combemale, B., Thirioux, X. & Baudry, B (2012). Formally Defining and Iterating Infinite Models. In Proceedings of the International Conference on Model Driven Engineering Languages and Systems (MODELS). Innsbruck, Austria. [More] [Online version] [Bibtex]
  • Omerovic, A., Kofod-Petersen, A., Solhaug, B., Svagård, I. & Tran, L. M. (2012). Report on ESUMS Risk Analysis, SINTEF ICT. [More] [Bibtex]
  • Omerovic, A., Solhaug, B. & Stolen, K. (2012). Assessing Practical Usefulness and Performance of the PREDIQT Method: An Industrial Case Study. Information and Software Technology, 54, 1377-1395. [More] [Bibtex]
  • Seehusen, F. & Solhaug, B (2012). Tool-Supported Risk Modeling and Analysis of Evolving Critical Infrastructures. In Multidisciplinary Research and Practice for Information Systems Series, pages 562-577. Springer. [More] [Bibtex]
  • Dürr, M., Protschky, V. & Linnhoff-Popien, C (2012). Modeling Social Network Interaction Graphs. In Proceedings of The IEEE/ACM 2012 International Conference on Advances in Social Networks Analysis and Mining (Asonam 2012). [More] [Bibtex]
  • Dürr, M., Maier, M. & Wiesner, K (2012). An Analysis of Query Forwarding Strategies for Secure and Privacy-Preserving Social Networks. In Proceedings of The IEEE/ACM 2012 International Conference on Advances in Social Networks Analysis and Mining (Asonam 2012). [More] [Bibtex]
  • Sprenger, C. & Basin, D (2012). Refining key establishment. In Proc. 25th IEEE Computer Security Foundations Symposium (CSF). [More] [Bibtex]
  • Najera, P., Roman, R. & Lopez, J (2012). Secure architecure for the integration of RFID and sensors in personal networks. In 7th International Workshop on Security and Trust Management (STM'11), pages 207-222. Copenhagen, Denmark : Springer. [More] [Bibtex]
  • Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E., Martinelli, F. & Mori, P (2012). Testing of PolPA Authorization Systems. In In Proc. of 7th International Workshop on Automation of Software Test. [More] [Bibtex]
  • Bartolini, C., Bertolino, A., Angelis, G. D., Ciancone, A. & Mirandola, R (2012). Non-Functional Analysis of Service Choreographies. In Proceedings of the 4th International Workshop on Principles of Engineering Service-Oriented Systems (PESOS), 34th International Conference on Software Engineering (ICSE). [More] [Bibtex]
  • Barthe, G., Köpf, B., Olmedo, F. & Béguelin, S. Z (2012). Probabilistic relational reasoning for differential privacy. In Field, J. & Hicks, M. (editors), Proceedings of the 39th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2012, Philadelphia, Pennsylvania, USA, January 22-28, 2012, pages 97-110. [More] [Bibtex]
  • Beckers, K., Faßbender, S., Küster, J.-C. & Schmidt, H (2012). A Pattern-Based Method for Identifying and Analyzing Laws. In REFSQ, pages 256-262. [More] [Bibtex]
  • Beckers, K., Faßbender, S., Heisel, M., Küster, J.-C. & Schmidt, H (2012). Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. In ESSoS, pages 14-21. [More] [Bibtex]
  • Beckers, K (2012). Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering Approaches. In Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012, pages 65-70. CEUR-WS.org. [More] [Bibtex]
  • Omerovic, A. (2012). PREDIQT: A Method for Model-based Prediction of Impacts of Architectural Design changes on System Quality. Phd Thesis, Faculty of Mathematics and Natural Sciences, University of Oslo. [More] [Bibtex]
  • Solhaug, B. & Stolen, K (2012). Uncertainty, Subjectivity, Trust and Risk -- How it All Fits Together. In Proc. 7th International Workshop on Security and Trust Management (STM'11), pages 1-5. Springer. [More] [Bibtex]
  • Ligaarden, O., Refsdal, A. & Stolen, K. (2012). Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis, SINTEF ICT. [More] [Bibtex]
  • Erdogan, G. & Stolen, K (2012). Risk-driven Security Testing versus Test-driven Security Risk Analysis. In Proceedings of the first ESSoS Doctoral Symposium (ESSoS-DS 2012), pages 5-10. [More] [Bibtex]
  • Ochoa, M (2012). Security Guarantees and Evolution: From models to reality. In Electronic Proc. of the 1st ESSoS Doctoral Symposium, ESSoS-DS 2012. CEUR-WS.org. [More] [Bibtex]
Results 226 - 250 of 353
<< Start < Prev 1 2 3 4 5 6 7 8 9 10 Next > End >>