Home Publications

Publications

Filter:
 

Year: 2011

  • Ligaarden, O. S., Lund, M. S., Refsdal, A., Seehusen, F. & Stolen, K (2011). An Architectural Pattern for Enterprise Level Monitoring Tools. In Proc. 2011 IEEE International Workshop on the Maintenance and Evolution of Service-Oriented and Cloud-Based Systems (MESOCA 2011). [More] [Bibtex]
  • Lund, M. S., Solhaug, B. & Stolen, K (2011). Risk Analysis of Changing and Evolving Systems using CORAS. In Aless, Aldini, . & Gorrieri, R. (editors), Foundations of Security Analysis and Design (FOSAD IV). Springer. [More] [Bibtex]
  • Lund, M. S (2011). Bridging the Gap in Model-based V&V Methodology. In Ahmed, N., Querica, D. & Jensen, C. D. (editors), Workshop Proceedings of the Fifth IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011), pages 389-396. IFIF WG 11.11 on Trust Management. [More] [Bibtex]
  • Solhaug, B. & Stolen, K. (2011). Preservation of Policy Adherence under Refinement. International Journal of Software and Informatics, 5(1--2), 139-157. [More] [Bibtex]
  • Seehusen, F. & Stolen, K (2011). An Evaluation of the Graphical Modeling Framework (GMF) based on the Development of the CORAS Tool. In Cabot, J. & Visser, E. (editors), Proc. 4th International Conference on Theory and Practice of Model Transformations (ICMT 2011), pages 152-166. [More] [Bibtex]
  • Ligaarden, O., Refsdal, A. & Stolen, K (2011). Experiences from Using Indicators to Validate Expert Judgments in Security Risk Analysis. In Proceedings of the 7th International Workshop on Security Measurements and Metrics (MetriSec 2011). [More] [Bibtex]
  • Ligaarden, O. S., Refsdal, A. & Stolen, K (2011). ValidKI: A Method for Designing Key Indicators to Monitor the Fulfillment of Business Objectives. In Proc. First International Conference on Business Intelligence and Technology (BUSTECH 2011), pages 57-62. [More] [Bibtex]
  • Håvaldsrud, T., Moller-Pedersen, B., Solhaug, B. & Stolen, K (2011). DeSPoT: A Method for the Development and Specification of Policies for Trust Negotiation. In Computer Science and Convergence, Proceedings of Computer Science and its Applications (CSA 2011), pages 93-104. Springer. [More] [Bibtex]
  • Bielova, N. & Massacci, F (2011). Predictability of Enforcement. In Proceedings of the International Symposium on Engineering Secure Software and Systems (ESSoS'11). [More] [Bibtex]
  • Barthe, G., Grégoire, B., Heraud, S. & Béguelin, S. Z (2011). Computer-Aided Security Proofs for the Working Cryptographer. In Rogaway, P. (editor), Advances in Cryptology - CRYPTO 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings, pages 71-90. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Barthe, G., Crespo, J. M. & Kunz, C (2011). Relational Verification Using Product Programs. In Butler, M. & Schulte, W. (editors), FM 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings, pages 200-214. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Barthe, G., Betarte, G., Campo, J. D. & Luna, C (2011). Formally Verifying Isolation and Availability in an Idealized Model of Virtualization. In Butler, M. & Schulte, W. (editors), FM 2011: Formal Methods - 17th International Symposium on Formal Methods, Limerick, Ireland, June 20-24, 2011. Proceedings, pages 231-245. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Barthe, G., Olmedo, F. & Béguelin, S. Z (2011). Verifiable Security of Boneh-Franklin Identity-Based Encryption. In Boyen, X. & Chen, X. (editors), Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings, pages 68-83. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Barthe, G. & Kunz, C. (2011). An Abstract Model of Certificate Translation. ACM Trans. Program. Lang. Syst., 33(4), 13. [More] [Bibtex]
  • Backes, M., Berg, M. & Köpf, B (2011). Non-uniform distributions in quantitative information-flow. In Cheung, B. S., Hui, L. C., S, R. S., Hu & Wong, D. S. (editors), ASIACCS, pages 367-375. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Colombo, M., Martinelli, F., Mori, P., Martini, B., Gharbaoui, M. & Castoldi, P. (2011). Extending Resource Access in Multi-Provider Networks using Trust Management. In International Journal of Computer Networks & Communications (IJCNC): Academy & Industry Research Collaboration Center (AIRCC), 3(3), 133-147. [More] [Bibtex]
  • Karopoulos, G. & Martinelli, F (2011). IMS Session Management Based on Usage Control. In Secure and Trust Computing, data management, and Applications (STA 2011). Springer. [More] [Bibtex]
  • Krautsevich, L., Lazouski, A., Martinelli, F. & Yautsiukhin, A (2011). Cost-effective Enforcement of UCON$_mboxA$ Policies. In CRiSIS, pages 70-77. [More] [Bibtex]
  • Krautsevich, L., Martinelli, F., Morisset, C. & Yautsiukhin, A (2011). Risk-based Auto-Delegation for Probabilistic Availability. In Proceeding of the 4th SETOP International Workshop on Autonomous and Spontaneous Security. Springer-Verlag. [More] [Online version] [Bibtex]
  • Krautsevich, L., Martinelli, F. & Yautsiukhin, A (2011). A general method for assessment of security in complex services. In Proceedings of the 4th European conference on Towards a service-based internet, pages 153-164. Berlin, Heidelberg : Springer-Verlag. [More] [Online version] [Bibtex]
  • Manova, D., Ilieva, S., Lonetti, F., Bertolino, A. & Bartolini, C (2011). Towards automated robustness testing of BPEL orchestrators. In Proceedings of the 12th International Conference on Computer Systems and Technologies, pages 659-664. [More] [Bibtex]
  • Basin, D., Clavel, M., Egea, M., de Dios, M. G., Dania, C., Ortiz, G. et al (2011). Model-Driven Development of Security-Aware GUIs for Data-Centric Applications, chapter 4, pages 101-124. Springer Berlin / Heidelberg. [More] [Bibtex]
  • Yskout, K., Ben\\\\_David, O.-N., Scandariato, R. & Baudry, B (2011). Requirements-driven runtime reconfiguration for security. In 1st International Workshop on Eternal Systems. [More] [Bibtex]
  • Yskout, K., Ben\\\_David, O.-N. & Baudry, B. (2011). Co-evolution and access control. Poster at SACMAT 2011. [More] [Bibtex]
  • Ryck, P. D., Decat, M., Desmet, L., Piessens, F. & Joosen, W (2011). Security of web mashups: a survey. In 15th Nordic Conference in Secure IT Systems (NordSec 2010). Springer. [More] [Online version] [Bibtex]
Results 301 - 325 of 353
<< Start < Prev 11 12 13 14 15 Next > End >>