Massacci, F. & Bielova, N. (2011). Iterative Enforcement by Suppression: Towards Practical Enforcement Theories. Journal of Computer Security (JCS). Journal of Computer Security.[More][Bibtex]
Asnar, Y., Li, T., Massacci, F. & Paci, F (2011). Computer Aided Threat Identification. In 13th IEEE Conference on Commerce and Enterprise Computing (CEC' 11).[More][Bibtex]
Massacci, F. & Bielova, N. (2011). Do you really mean what you actually enforced? Edit Automata revisited.International Journal of Information Security (IJIS). journal-of-information-security.[More][Bibtex]
Matteucci, I., Mori, P., Petrocchi, M. & Wiegand, L (2011). Controlled Data Sharing in E-health. In SocioTechnical Aspects in Security and Trust, pages 17-23. IEEE.[More][Bibtex]
Matteucci, I., Petrocchi, M., Sbodio, M. L. & Wiegand, L (2011). A Design Phase for Data Sharing Agreements. In Data Privacy Management. Springer.[More][Bibtex]
Côté, I., Hatebur, D., Heisel, M. & Schmidt, H (2011). UML4PF -- A Tool for Problem-Oriented Requirements Analysis. In Proceedings of the International Conference on Requirements Engineering (RE), pages 349-350. IEEE Computer Society.[More][Bibtex]
Schwittek, W., Schmidt, H., Eicker, S. & Heisel, M (2011). Towards a Common Body of Knowledge for Engineering Secure Software and Services. In Proceedings of the International Conference on Knowledge Management and Information Sharing (KMIS).[More][Bibtex]
Hachem, S., Toninelli, A., Pathak, A. & Issarny, V (2011). Policy-Based Access Control in Mobile Social Ecosystems. In IEEE International Symposium on Policies for Distributed Systems and Networks. IEEE Computer Society.[More][Bibtex]
Busch, M., Knapp, A. & Koch, N (2011). Modeling Secure Navigation in Web Information Systems. In Grabis, J. & Kirikova, M. (editors), 10th International Conference on Business Perspectives in Informatics Research. Springer Verlag.[More][Bibtex]
Basin, D., Clavel, M. & Egea, M (2011). A decade of model-driven security. In Breu, R., Crampton, J. & Lobo, J. (editors), SACMAT, 16th ACM Symposium on Access Control Models and Technologies, Innsbruck, Austria, June 15-17, 2011, Proceedings, pages 1-10. ACM.[More][Bibtex]
Barthe, G. & Köpf, B (2011). Information-theoretic Bounds for Differentially Private Mechanisms. In Proceedings of the 24th IEEE Computer Security Foundations Symposium, CSF 2011, Cernay-la-Ville, France, 27-29 June, 2011. IEEE Computer Society.[More][Bibtex]
Nanevski, A., Banerjee, A. & Garg, D (2011). Verification of Information Flow and Access Control Policies with Dependent Types. In IEEE Symposium on Security and Privacy.[More][Bibtex]
Baiardi, F., Telmon, C. & Sgandurra, D (2011). A simulation-driven approach for assessing risks of complex systems. In 13th European Workshop on Dependable Computing, pages 35-40. New York, NY, USA : ACM.[More][Online version][Bibtex]
Pietro, R. D. & Verde, N. V (2011). Introducing Epidemic Models for Data Survivability in Unattended Wireless Sensor Networks. In Second International Workshop on Data Security and PrivAcy in wireless Networks (D-SPAN 2011). Lucca, Italy.[More][Bibtex]
Mori, P. & Martinelli, F (2011). Distributed Authorization System with Mobile Usage Control Policies. In Computer Aided Systems Theory (EUROCAST 2011).[More][Bibtex]
Alcaraz, C., Fernandez-Gago, C. & Lopez, J. (2011). An Early Warning System based on Reputation for Energy Control Systems. Transactions on Smart Grid- Special Issue on Cyber, Physical and System Security for Smart Grid.[More][Bibtex]
Rios, R. & Lopez, J. (2011). Exploiting Context-Awareness to Enhance Source-Location Privacy in Wireless Sensor Networks. The Computer Journal, 54(10), 1603-1615.[More][Bibtex]
Joosen, W., Lopez, J., Martinelli, F. & Massacci, F (2011). Engineering Secure Future Internet Services. The Future Internet. Springer Berlin / Heidelberg.[More][Online version][Bibtex]
Krautsevich, L., Martinelli, F. & Yautsiukhin, A (2011). Formal Analysis of Security Metrics and Risk. In WISPT.[More][Bibtex]
Costa, G. & Matteucci, I (2011). Elective Temporal Logic. In Proceedings of ISARCS 2011.[More][Bibtex]
Martinelli, F. & Matteucci, I (2011). Preserving Security Properties under Refinement. In Proceedings of SESS 2011.[More][Bibtex]
Costa, G. & Matteucci, I (2011). Trust-Driven Policy Enforcement through Gate Automata. In Proceedings of IMIS 2011.[More][Bibtex]
Costa, G., Dragoni, N., Issarny, V., Lazouski, A., Martinelli, F., Massacci, F. et al. (2011). Extending Security-by-Contract with Quantitative Trust on Mobile Devices. Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JOWUA), 1(4), 75-91.[More][Bibtex]
Costa, G., Lazouski, A., Martinelli, F. & Mori, P (2011). Application security for mobile devices. In Dependability and Computer Engineering: Concepts for Software-Intensive Systems. IGI Global.[More][Bibtex]
Basin, D., Burri, S. J. & Karjoth, G (2011). Obstruction-free Authorization Enforcement: Aligning Security and Business Objectives. In 24th Computer Security Foundations Symposium (CSF 2011), pages 99-113. Cernay-la-Ville, France : IEEE.[More][Bibtex]