Home Publications

Publications

Filter:
 

Year: 2012

  • Ochoa, M., Jürjens, J. & Warzecha, D (2012). A Sound Decision Procedure for the Compositionality of Secrecy. In Proc. of the 4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012, pages 97-105. Springer. [More] [Bibtex]
  • Cúellar, J., Ochoa, M. & Rios, R (2012). Indistinguishable regions in Geographic Location Privacy. In Proc. of the 2012 ACM Symposium on Applied Computing (SAC), Security Track. ACM. [More] [Bibtex]
  • Ochoa, M., Jürjens, J. & Cuéllar, J (2012). Non-interference on UML State-charts. In 50th International Conference on Objects, Models, Components, Patterns (TOOLS Europe 2012). Springer. [More] [Bibtex]
  • Bertolino, A., Daoudagh, S., Lonetti, F. & Marchetti, E (2012). Automatic XACML requests generation for policy testing. In The Third International Workshop on Security Testing (SECTEST) 2012. [More] [Bibtex]
  • Moyano, F., Fernández-Gago, C. & López, J (2012). Service-Oriented Trust and Reputation Architecture. In Cuellar, J. & Koch, N. (editors), Proceedings of the Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS-DS 2012), pages 41-46. CEUR-WS. [More] [Online version] [Bibtex]
  • Bertolino, A., Daoudagh, S., Lonetti, F. & Marchetti, E (2012). The X-CREATE framework: a comparison of XACML policy testing strategies. In Proceedings of the 8th International Conference on Web Information Systems and Technologies (WEBIST). [More] [Bibtex]
  • Dania, C (2012). Modeling Social Networking Privacy. In Cuellar, J. & Koch, N. (editors), Doctoral Symposium of ESSoS 2012, pages 49-54. CEUR-WS.org. [More] [Bibtex]
  • Krautsevich, L (2012). Parametric Attack Graph Construction and Analysis. In Cuellar, J. & Koch, N. (editors), Proceedings of the Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS 2012), pages 29-34. CEUR-WS. [More] [Bibtex]
  • Yskout, K., Scandariato, R. & Joosen, W. (2012). Change Patterns: Co-evolving Requirements and Architecture. Software and Systems Modeling. [More] [Bibtex]
  • Yskout, K., Scandariato, R. & Joosen, W (2012). Does Organizing Security Patterns Focus Architectural Choices?. In International Conference on Software Engineering (ICSE '12). [More] [Bibtex]
  • Rosenberg, S., Banerjee, A. & Naumann, D. A (2012). Decision Procedures for Region Logic. In Kuncak, V. & Rybalchenko, A. (editors), Verification, Model Checking, and Abstract Interpretation - 13th International Conference, VMCAI 2012, Philadelphia, PA, USA, January 22-24, 2012. Proceedings, pages 379-395. Springer. [More] [Bibtex]
  • Bistarelli, S., Martinelli, F. & Santini, F. (2012). A semiring-based framework for the deduction/abduction reasoning in access control with weighted credentials. Computers & Mathematics with Applications. [More] [Online version] [Bibtex]
  • Martín, J. A., Martinelli, F. & Pimentel, E. (2012). Synthesis of secure adaptors. Journal of Logic and Algebraic Programming, 81(2), 99 - 126. [More] [Online version] [Bibtex]
  • Costantino, G., Morisset, C. & Petrocchi, M (2012). Subjective Review-based Reputation. In Symposium of Applied Computing. ACM. [More] [Online version] [Bibtex]
  • Costantino, G., Martinelli, F. & Petrocchi, M (2012). Priorities-based Review Computation. In AAAI Spring Symposia. Association for the Advancement of Artificial Intelligence. [More] [Online version] [Bibtex]
  • Eckhardt, J., M\, T., AlTurki, M., Meseguer, J. & Wirsing, M (2012). Stable Availability under Denial of Service Attacks through Formal Patterns. In Lara, Juan, Zisman & Andrea (editors), 15th International Conference on Fundamentals of Software Engineering (FASE'12). Springer. [More] [Bibtex]
  • Mühlbauer, T. & Eckhardt, J (2012). Enhancing Safety and Security of Distributed Systems through Formal Patterns. In Proceedings of the first ESSoS Doctoral Symposium. [More] [Bibtex]
  • Bartolini, C., Bertolino, A., Ciancone, A., Angelis, G. D. & Mirandola, R (2012). Quality requirements for service choreographies. In Proceedings of the 8th International Conference on Web Information Systems and Technologies (WEBIST). [More] [Bibtex]

Year: 2011

  • Patel, P., Pathak, A., Teixeira, T. & Issarny, V (2011). Towards Application Development for the Internet of Things. In Proceedings of the 8th Middleware Doctoral Symposium. [More] [Online version] [Bibtex]
  • Acker, S. V., Ryck, P. D., Desmet, L., Piessens, F. & Joosen, W (2011). WebJail: Least-privilege integration of third-party components in web mashups. In ACSAC. [More] [Online version] [Bibtex]
  • Gheorghe, G., Crispo, B., Carbone, R., Desmet, L. & Joosen, W (2011). Deploy, adjust and readjust: Supporting dynamic reconfiguration of policy enforcement. In ACM/IFIP/USENIX 12th International Middleware Conference. IFIP/Springer. [More] [Online version] [Bibtex]
  • Ilieva, S., Manova, D., Manova, I., Bartolini, C., Bertolino, A. & Lonetti, F (2011). An automated approach to robustness testing of BPEL orchestrations. In Sixth IEEE International Symposium on Service Oriented System Engineering (SOSE). [More] [Bibtex]
  • Blouin, A., Combemale, B., Baudry, B. & Beaudoux, O (2011). Modeling Model Slicers. In Proceedings of MODELS'11. Wellington, New Zealand. [More] [Bibtex]
  • Najera, P., Roman, R. & Lopez, J (2011). Acceso seguro a nodos RFID en una arquitectura de red personal. In Hackbarth, K., Agüero, R. & Sanz, R. (editors), X Jornadas de Ingeniera Telematica (JITEL 2011), pages 104-111. Santander (Spain) : Universidad de Cantabria. [More] [Bibtex]
  • Ryck, P. D., Desmet, L., Joosen, W. & Piessens, F (2011). Automatic and precise client-side protection against CSRF attacks. In Lecture Notes in Computer Science, pages 100-116. Springer. [More] [Online version] [Bibtex]
Results 251 - 275 of 353
<< Start < Prev 11 12 13 14 15 Next > End >>