


default search action
3. ESSoS 2011: Madrid, Spain
- Úlfar Erlingsson, Roel J. Wieringa, Nicola Zannone

:
Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings. Lecture Notes in Computer Science 6542, Springer 2011, ISBN 978-3-642-19124-4
Model-Based Security I
- Benjamin Aziz, Alvaro E. Arenas, Michael D. Wilson

:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations. 1-14 - David J. Power, Mark Slaymaker

, Andrew Simpson
:
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy. 15-28 - Wihem Arsac, Luca Compagna, Giancarlo Pellegrino

, Serena Elisa Ponta:
Security Validation of Business Processes via Model-Checking. 29-42
Tools and Mechanisms
- Arnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl:

On-Device Control Flow Verification for Java Programs. 43-57 - Ricardo Corin, Felipe Andrés Manzano:

Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations. 58-72 - Nataliia Bielova

, Fabio Massacci
:
Predictability of Enforcement. 73-86
Web Security
- Nick Nikiforakis, Wannes Meert

, Yves Younan, Martin Johns
, Wouter Joosen:
SessionShield: Lightweight Protection against Session Hijacking. 87-100 - Thanh-Binh Dao, Etsuya Shibayama

:
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications. 101-113 - Philippe De Ryck, Lieven Desmet

, Wouter Joosen:
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications. 114-127
Model-Based Security II
- Jörn Eichler:

Lightweight Modeling and Analysis of Security Concepts. 128-141 - Linda Ariani Gunawan, Frank Alexander Kraemer, Peter Herrmann

:
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications. 142-155 - Michaela Bunke, Karsten Sohr

:
An Architecture-Centric Approach to Detecting Security Patterns in Software. 156-166
Security Requirements Engineering
- Thomas Heyman, Koen Yskout

, Riccardo Scandariato, Holger Schmidt, Yijun Yu
:
The Security Twin Peaks. 167-180 - Michael Felderer

, Berthold Agreiter, Ruth Breu:
Evolution of Security Requirements Tests for Service-Centric Systems. 181-194 - Fabio Massacci

, Stephan Neuhaus, Viet Hung Nguyen:
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes. 195-208
Authorization
- Steffen Bartsch:

Authorization Enforcement Usability Case Study. 209-220 - Tom Goovaerts, Lieven Desmet

, Wouter Joosen:
Scalable Authorization Middleware for Service Oriented Architectures. 221-233 - Naveed Ahmed, Christian Damsgaard Jensen

:
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models. 234-247
Ideas
- Jing Xie, Bill Chu, Heather Richter Lipford:

Idea: Interactive Support for Secure Software Development. 248-255 - Ingo Müller, Jun Han, Jean-Guy Schneider

, Steven Versteeg:
Idea: A Reference Platform for Systematic Information Security Management Tool Support. 256-263 - Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:

Idea: Simulation Based Security Requirement Verification for Transaction Level Models. 264-271

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














