Home Publications

Publications

Filter:
 

Year: 2011

  • Massacci, F. & Bielova, N. (2011). Iterative Enforcement by Suppression: Towards Practical Enforcement Theories. Journal of Computer Security (JCS). Journal of Computer Security. [More] [Bibtex]
  • Asnar, Y., Li, T., Massacci, F. & Paci, F (2011). Computer Aided Threat Identification. In 13th IEEE Conference on Commerce and Enterprise Computing (CEC' 11). [More] [Bibtex]
  • Massacci, F. & Bielova, N. (2011). Do you really mean what you actually enforced? Edit Automata revisited.International Journal of Information Security (IJIS). journal-of-information-security. [More] [Bibtex]
  • Matteucci, I., Mori, P., Petrocchi, M. & Wiegand, L (2011). Controlled Data Sharing in E-health. In SocioTechnical Aspects in Security and Trust, pages 17-23. IEEE. [More] [Bibtex]
  • Matteucci, I., Petrocchi, M., Sbodio, M. L. & Wiegand, L (2011). A Design Phase for Data Sharing Agreements. In Data Privacy Management. Springer. [More] [Bibtex]
  • Côté, I., Hatebur, D., Heisel, M. & Schmidt, H (2011). UML4PF -- A Tool for Problem-Oriented Requirements Analysis. In Proceedings of the International Conference on Requirements Engineering (RE), pages 349-350. IEEE Computer Society. [More] [Bibtex]
  • Schwittek, W., Schmidt, H., Eicker, S. & Heisel, M (2011). Towards a Common Body of Knowledge for Engineering Secure Software and Services. In Proceedings of the International Conference on Knowledge Management and Information Sharing (KMIS). [More] [Bibtex]
  • Hachem, S., Toninelli, A., Pathak, A. & Issarny, V (2011). Policy-Based Access Control in Mobile Social Ecosystems. In IEEE International Symposium on
Policies for Distributed Systems and Networks. IEEE Computer Society. [More] [Bibtex]
  • Busch, M., Knapp, A. & Koch, N (2011). Modeling Secure Navigation in Web Information Systems. In Grabis, J. & Kirikova, M. (editors), 10th International Conference on Business Perspectives in Informatics Research. Springer Verlag. [More] [Bibtex]
  • Basin, D., Clavel, M. & Egea, M (2011). A decade of model-driven security. In Breu, R., Crampton, J. & Lobo, J. (editors), SACMAT, 16th ACM Symposium on Access Control Models and Technologies, Innsbruck, Austria, June 15-17, 2011, Proceedings, pages 1-10. ACM. [More] [Bibtex]
  • Barthe, G. & Köpf, B (2011). Information-theoretic Bounds for Differentially Private Mechanisms. In Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011. IEEE Computer Society. [More] [Bibtex]
  • Nanevski, A., Banerjee, A. & Garg, D (2011). Verification of Information Flow and Access Control Policies with Dependent Types. In IEEE Symposium on Security and Privacy. [More] [Bibtex]
  • Baiardi, F., Telmon, C. & Sgandurra, D (2011). A simulation-driven approach for assessing risks of complex systems. In 13th European Workshop on Dependable Computing, pages 35-40. New York, NY, USA : ACM. [More] [Online version] [Bibtex]
  • Pietro, R. D. & Verde, N. V (2011). Introducing Epidemic Models for Data Survivability in Unattended Wireless Sensor Networks. In Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2011). Lucca, Italy. [More] [Bibtex]
  • Mori, P. & Martinelli, F (2011). Distributed Authorization System with Mobile Usage Control Policies. In Computer Aided Systems Theory (EUROCAST 2011). [More] [Bibtex]
  • Alcaraz, C., Fernandez-Gago, C. & Lopez, J. (2011). An Early Warning System based on Reputation for Energy Control Systems. Transactions on Smart Grid- Special Issue on Cyber, Physical and System Security for Smart Grid. [More] [Bibtex]
  • Rios, R. & Lopez, J. (2011). Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks. The Computer Journal, 54(10), 1603-1615. [More] [Bibtex]
  • Joosen, W., Lopez, J., Martinelli, F. & Massacci, F (2011). Engineering Secure Future Internet Services. The Future Internet. Springer Berlin / Heidelberg. [More] [Online version] [Bibtex]
  • Krautsevich, L., Martinelli, F. & Yautsiukhin, A (2011). Formal Analysis of Security Metrics and Risk. In WISPT. [More] [Bibtex]
  • Costa, G. & Matteucci, I (2011). Elective Temporal Logic. In Proceedings of ISARCS 2011. [More] [Bibtex]
  • Martinelli, F. & Matteucci, I (2011). Preserving Security Properties under Refinement. In Proceedings of SESS 2011. [More] [Bibtex]
  • Costa, G. & Matteucci, I (2011). Trust-Driven Policy Enforcement through Gate Automata. In Proceedings of IMIS 2011. [More] [Bibtex]
  • Costa, G., Dragoni, N., Issarny, V., Lazouski, A., Martinelli, F., Massacci, F. et al. (2011). Extending Security-by-Contract with Quantitative Trust on Mobile Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JOWUA), 1(4), 75-91. [More] [Bibtex]
  • Costa, G., Lazouski, A., Martinelli, F. & Mori, P (2011). Application security for mobile devices. In Dependability and Computer Engineering: Concepts for Software-Intensive Systems. IGI Global. [More] [Bibtex]
  • Basin, D., Burri, S. J. & Karjoth, G (2011). Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives. In 24th Computer Security Foundations Symposium (CSF 2011), pages 99-113. Cernay-la-Ville, France : IEEE. [More] [Bibtex]
Results 326 - 350 of 353
<< Start < Prev 11 12 13 14 15 Next > End >>