Bielova, N., Devriese, D., Massacci, F. & Piessens, F (2011). Reactive non-interference for a browser model. In Proceedings of the 5th International Conference on Network and System Security (NSS 2011).[More][Online version][Bibtex]
Roman, R., Najera, P. & Lopez, J. (2011). Securing the Internet of Things. IEEE Computer, 44(9), 51-58.[More][Bibtex]
Caballero, J., Grier, C., Kreibich, C. & Paxson, V (2011). Measuring Pay-per-Install: The Commoditization of Malware Distribution. In Proceedings of the the 20th USENIX Security Symposium. San Francisco, CA.[More][Bibtex]
Omerovic, A. & Stolen, K. (2011). Traceability Handling in Model-based Prediction of System Quality, SINTEF ICT.[More][Bibtex]
Bielova, N. & Massacci, F (2011). Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. In Policies for Distributed Systems and Networks (POLICY), 2011 IEEE International Symposium on, pages 89 -96.[More][Bibtex]
Wuyts, K., Scandariato, R., Verhenneman, G. & Joosen, W. (2011). Integrating Patient Consent in e-Health Access Control. International Journal of Secure Software Engineering, IGI Global, 2(2).[More][Bibtex]
Nunez, D., Agudo, I., Drogkaris, P. & Gritzalis, S (2011). Identity Management Challenges for Intercloud Applications. In 1st International Workshop on Security and Trust for Applications in Virtualised Environments (STAVE 2011). Crete (Greece).[More][Bibtex]
Costa, G., Degano, P. & Martinelli, F. (2011). Secure service orchestration in open networks. J. Syst. Archit., 57, 231-239.[More][Online version][Bibtex]
Basin, D., Burri, S. J. & Karjoth, G (2011). Separation of Duties as a Service. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’11), Hong Kong, China.[More][Bibtex]
Massacci, F. & Bielova, N (2011). Predictability of Enforcement. In Policies for Distributed Systems and Networks (POLICY), 2011 IEEE International Symposium on. Springer.[More][Bibtex]
Brændeland, G., Refsdal, A. & Stolen, K. (2011). A denotational model for component-based risk analysis, Department of Informatics, University of Oslo.[More][Bibtex]
Bielova, N., Devriese, D., Massacci, F. & Piessens, F. (2011). Reactive non-interference for the browser: extended version, Department of Computer Science, K.U.Leuven.[More][Online version][Bibtex]
Basin, D., Burri, S. J. & Karjoth, G. (2011). Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives, IBM Research – Zurich.[More][Bibtex]
Omerovic, A., Solhaug, B. & Stolen, K. (2011). Evaluation of experiences from applying the PREDIQT method in an industrial case study, SINTEF ICT.[More][Bibtex]
Saadi, R., Rahaman, M., Issarny, V. & Toninelli, A (2011). Composing Trust Models towards Interoperable Trust Management. In Trust Management V, pages 51-66. Springer Boston.[More][Online version][Bibtex]
Seyedi, A., Saadi, R. & Issarny, V (2011). Proximity-Based Trust Inference for Mobile Social Networking. In Wakeman, Ian, Gudes, Ehud, Jensen, Christian et al (editors), Trust Management V, pages 253-264. Springer Boston.[More][Online version][Bibtex]
Cubo, J. & Pimentel, E (2011). DAMASCo: A Framework for the Automatic Composition of Component-Based and Service-Oriented Architectures. In ECSA'2011- European Conference on Software Architecture, pages 388-404. Alemania : Springer-Verlag.[More][Bibtex]
Costa, G., Martinelli, F., Issarny, V., Saadi, R. & Matteucci, I (2011). Security and Trust. 11th International School on Formal Methods for the Design of Computer, Communication and Software: Connectors for Eternal Networked Software Systems. Springer.[More][Bibtex]
Johnson, N. M., Caballero, J., Chen, K. Z., McCamant, S., Poosankam, P., Reynaud, D. et al (2011). Differential Slicing: Identifying Causal Execution Differences for Security Applications. In IEEE Symposium on Security and Privacy, pages 347-362. IEEE Computer Society.[More][Bibtex]
Avanesov, T., Chevalier, Y., Mekki, M. A., Rusinowitch, M. & Turuani, M (2011). Distributed Orchestration of Web Services under Security Constraints. In Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, pages 235-252.[More][Bibtex]
Avanesov, T., Chevalier, Y., Mekki, M. A. & Rusinowitch, M (2011). Web Services Verification and Prudent Implementation. In Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, pages 173-189.[More][Bibtex]
Nilsson, E. G. & Stolen, K (2011). Generic functionality in user interfaces for emergency response. In Proceedings of the 23rd Australian Computer-Human Interaction Conference (OzCHI'11), pages 233-242. ACM.[More][Bibtex]
Omerovic, A. & Stolen, K (2011). Evaluation of experiences from applying the PREDIQT method in an industrial case study. In Proc. 5th IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI'11), pages 137-146.[More][Bibtex]
Omerovic, A. & Stolen, K. (2011). A practical approach to uncertainty handling and estimate acquisition in model-based prediction of system quality. International Journal on Advances in Systems and Measurements, 4(1-2), 55-70.[More][Bibtex]
Omerovic, A. & Stolen, K (2011). Traceability Handling in Model-based Prediction of System Quality. In In Proc. The Third International Conference on Advances in System Simulation (SIMUL 2011), pages 79-88. IARIA.[More][Bibtex]