


default search action
7. ESSoS 2015: Milan, Italy
- Frank Piessens, Juan Caballero, Nataliia Bielova

:
Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings. Lecture Notes in Computer Science 8978, Springer 2015, ISBN 978-3-319-15617-0
Formal Methods
- Stefano Calzavara

, Alvise Rabitti, Michele Bugliesi
:
Formal Verification of Liferay RBAC. 1-16 - Marouane Fazouane, Henning Kopp, Rens W. van der Heijden

, Daniel Le Métayer, Frank Kargl:
Formal Verification of Privacy Properties in Electric Vehicle Charging. 17-33 - Martín Ochoa

, Jorge Cuéllar, Alexander Pretschner, Per A. Hallgren:
Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs. 34-42 - Raoul Strackx, Niels Lambrigts:

Idea: State-Continuous Transfer of State in Protected-Module Architectures. 43-50
Machine Learning
- Kevin Allix, Tegawendé F. Bissyandé

, Jacques Klein
, Yves Le Traon
:
Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. 51-67 - David Pfaff, Sebastian Hack, Christian Hammer

:
Learning How to Prevent Return-Oriented Programming Efficiently. 68-85
Cloud and Passwords
- Thuy D. Nguyen, Mark A. Gondree

, Jean Khosalim, Cynthia E. Irvine:
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores. 86-101 - Philippe Massonet

, Jesus Luna, Alain Pannetrat, Rubén Trapero:
Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints. 102-110 - Raoul Strackx, Pieter Philippaerts, Frédéric Vogels:

Idea: Towards an Inverted Cloud. 111-118 - Markus Dürmuth

, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi:
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. 119-132
Measurements and Ontologies
- Luca Allodi:

The Heavy Tails of Vulnerability Exploitation. 133-148 - Sebastian Banescu, Martín Ochoa, Nils Kunze, Alexander Pretschner:

Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation. 149-156 - Amina Souag, Camille Salinesi, Raúl Mazo, Isabelle Comyn-Wattiau

:
A Security Ontology for Security Requirements Elicitation. 157-177
Access Control
- Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan

:
Producing Hook Placements to Enforce Expected Access Control Policies. 178-195 - Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen:

Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates. 196-210 - Lars Hamann

, Karsten Sohr
, Martin Gogolla:
Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. 211-226

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














