Home Publications

Publications

Filter:
 

Year: 2011

  • Bielova, N., Devriese, D., Massacci, F. & Piessens, F (2011). Reactive non-interference for a browser model. In Proceedings of the 5th International Conference on Network and System Security (NSS 2011). [More] [Online version] [Bibtex]
  • Roman, R., Najera, P. & Lopez, J. (2011). Securing the Internet of Things. IEEE Computer, 44(9), 51-58. [More] [Bibtex]
  • Caballero, J., Grier, C., Kreibich, C. & Paxson, V (2011). Measuring Pay-per-Install: The Commoditization of Malware Distribution. In Proceedings of the the 20th USENIX Security Symposium. San Francisco, CA. [More] [Bibtex]
  • Omerovic, A. & Stolen, K. (2011). Traceability Handling in Model-based Prediction of System Quality, SINTEF ICT. [More] [Bibtex]
  • Bielova, N. & Massacci, F (2011). Computer-Aided Generation of Enforcement Mechanisms for Error-Tolerant Policies. In Policies for Distributed Systems and Networks (POLICY), 2011 IEEE International Symposium on, pages 89 -96. [More] [Bibtex]
  • Wuyts, K., Scandariato, R., Verhenneman, G. & Joosen, W. (2011). Integrating Patient Consent in e-Health Access Control. International Journal of Secure Software Engineering, IGI Global, 2(2). [More] [Bibtex]
  • Nunez, D., Agudo, I., Drogkaris, P. & Gritzalis, S (2011). Identity Management Challenges for Intercloud Applications. In 1st International Workshop on Security and Trust for Applications in Virtualised Environments (STAVE 2011). Crete (Greece). [More] [Bibtex]
  • Costa, G., Degano, P. & Martinelli, F. (2011). Secure service orchestration in open networks. J. Syst. Archit., 57, 231-239. [More] [Online version] [Bibtex]
  • Basin, D., Burri, S. J. & Karjoth, G (2011). Separation of Duties as a Service. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security (ASIACCS ’11), Hong Kong, China. [More] [Bibtex]
  • Massacci, F. & Bielova, N (2011). Predictability of Enforcement. In Policies for Distributed Systems and Networks (POLICY), 2011 IEEE International Symposium on. Springer. [More] [Bibtex]
  • Brændeland, G., Refsdal, A. & Stolen, K. (2011). A denotational model for component-based risk analysis, Department of Informatics, University of Oslo. [More] [Bibtex]
  • Bielova, N., Devriese, D., Massacci, F. & Piessens, F. (2011). Reactive non-interference for the browser: extended version, Department of Computer Science, K.U.Leuven. [More] [Online version] [Bibtex]
  • Basin, D., Burri, S. J. & Karjoth, G. (2011). Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives, IBM Research – Zurich. [More] [Bibtex]
  • Omerovic, A., Solhaug, B. & Stolen, K. (2011). Evaluation of experiences from applying the PREDIQT method in an industrial case study, SINTEF ICT. [More] [Bibtex]
  • Saadi, R., Rahaman, M., Issarny, V. & Toninelli, A (2011). Composing Trust Models towards Interoperable Trust Management. In Wakeman, Ian, Gudes, Ehud, Jensen, Christian et al (editors), Trust Management V, pages 51-66. Springer Boston. [More] [Online version] [Bibtex]
  • Seyedi, A., Saadi, R. & Issarny, V (2011). Proximity-Based Trust Inference for Mobile Social Networking. In Wakeman, Ian, Gudes, Ehud, Jensen, Christian et al (editors), Trust Management V, pages 253-264. Springer Boston. [More] [Online version] [Bibtex]
  • Cubo, J. & Pimentel, E (2011). DAMASCo: A Framework for the Automatic Composition of Component-Based and Service-Oriented Architectures. In ECSA'2011- European Conference on Software Architecture, pages 388-404. Alemania : Springer-Verlag. [More] [Bibtex]
  • Costa, G., Martinelli, F., Issarny, V., Saadi, R. & Matteucci, I (2011). Security and Trust. 11th International School on Formal Methods for the Design of Computer, Communication and Software: Connectors for Eternal Networked Software Systems. Springer. [More] [Bibtex]
  • Johnson, N. M., Caballero, J., Chen, K. Z., McCamant, S., Poosankam, P., Reynaud, D. et al (2011). Differential Slicing: Identifying Causal Execution Differences for Security Applications. In IEEE Symposium on Security and Privacy, pages 347-362. IEEE Computer Society. [More] [Bibtex]
  • Avanesov, T., Chevalier, Y., Mekki, M. A., Rusinowitch, M. & Turuani, M (2011). Distributed Orchestration of Web Services under Security Constraints. In Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, pages 235-252. [More] [Bibtex]
  • Avanesov, T., Chevalier, Y., Mekki, M. A. & Rusinowitch, M (2011). Web Services Verification and Prudent Implementation. In Data Privacy Management and Autonomous Spontaneus Security - 6th International Workshop, DPM 2011, and 4th International Workshop, SETOP 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers, pages 173-189. [More] [Bibtex]
  • Nilsson, E. G. & Stolen, K (2011). Generic functionality in user interfaces for emergency response. In Proceedings of the 23rd Australian Computer-Human Interaction Conference (OzCHI'11), pages 233-242. ACM. [More] [Bibtex]
  • Omerovic, A. & Stolen, K (2011). Evaluation of experiences from applying the PREDIQT method in an industrial case study. In Proc. 5th IEEE International Conference on Secure Software Integration and Reliability Improvement (SSIRI'11), pages 137-146. [More] [Bibtex]
  • Omerovic, A. & Stolen, K. (2011). A practical approach to uncertainty handling and estimate acquisition in model-based prediction of system quality. International Journal on Advances in Systems and Measurements, 4(1-2), 55-70. [More] [Bibtex]
  • Omerovic, A. & Stolen, K (2011). Traceability Handling in Model-based Prediction of System Quality. In In Proc. The Third International Conference on Advances in System Simulation (SIMUL 2011), pages 79-88. IARIA. [More] [Bibtex]
Results 276 - 300 of 353
<< Start < Prev 11 12 13 14 15 Next > End >>