default search action
3. ESSoS 2011: Madrid, Spain
- Úlfar Erlingsson, Roel J. Wieringa, Nicola Zannone:
Engineering Secure Software and Systems - Third International Symposium, ESSoS 2011, Madrid, Spain, February 9-10, 2011. Proceedings. Lecture Notes in Computer Science 6542, Springer 2011, ISBN 978-3-642-19124-4
Model-Based Security I
- Benjamin Aziz, Alvaro E. Arenas, Michael D. Wilson:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations. 1-14 - David J. Power, Mark Slaymaker, Andrew Simpson:
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy. 15-28 - Wihem Arsac, Luca Compagna, Giancarlo Pellegrino, Serena Elisa Ponta:
Security Validation of Business Processes via Model-Checking. 29-42
Tools and Mechanisms
- Arnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl:
On-Device Control Flow Verification for Java Programs. 43-57 - Ricardo Corin, Felipe Andrés Manzano:
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations. 58-72 - Nataliia Bielova, Fabio Massacci:
Predictability of Enforcement. 73-86
Web Security
- Nick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns, Wouter Joosen:
SessionShield: Lightweight Protection against Session Hijacking. 87-100 - Thanh-Binh Dao, Etsuya Shibayama:
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications. 101-113 - Philippe De Ryck, Lieven Desmet, Wouter Joosen:
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications. 114-127
Model-Based Security II
- Jörn Eichler:
Lightweight Modeling and Analysis of Security Concepts. 128-141 - Linda Ariani Gunawan, Frank Alexander Kraemer, Peter Herrmann:
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications. 142-155 - Michaela Bunke, Karsten Sohr:
An Architecture-Centric Approach to Detecting Security Patterns in Software. 156-166
Security Requirements Engineering
- Thomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu:
The Security Twin Peaks. 167-180 - Michael Felderer, Berthold Agreiter, Ruth Breu:
Evolution of Security Requirements Tests for Service-Centric Systems. 181-194 - Fabio Massacci, Stephan Neuhaus, Viet Hung Nguyen:
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes. 195-208
Authorization
- Steffen Bartsch:
Authorization Enforcement Usability Case Study. 209-220 - Tom Goovaerts, Lieven Desmet, Wouter Joosen:
Scalable Authorization Middleware for Service Oriented Architectures. 221-233 - Naveed Ahmed, Christian Damsgaard Jensen:
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models. 234-247
Ideas
- Jing Xie, Bill Chu, Heather Richter Lipford:
Idea: Interactive Support for Secure Software Development. 248-255 - Ingo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg:
Idea: A Reference Platform for Systematic Information Security Management Tool Support. 256-263 - Johannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner:
Idea: Simulation Based Security Requirement Verification for Transaction Level Models. 264-271
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.