BibSLEIGH
BibSLEIGH corpus
BibSLEIGH tags
BibSLEIGH bundles
BibSLEIGH people
CC-BY
Open Knowledge
XHTML 1.0 W3C Rec
CSS 2.1 W3C CanRec
email twitter
Used together with:
system (153)
base (134)
model (126)
analysi (103)
protocol (97)

Stem secur$ (all stems)

1123 papers:

ECSAECSA-2015-FernandezAP #architecture #security
Revisiting Architectural Tactics for Security (EBF, HA, GPG), pp. 55–69.
QoSAQoSA-2015-MyllarniemiRM #configuration management #product line #representation #security #variability
Representing and Configuring Security Variability in Software Product Lines (VM, MR, TM), pp. 1–10.
CASECASE-2015-JiangDZZ #formal method #mobile #modelling #verification
Formal modeling and verification of secure mobile agent systems (MJ, ZD, MZ, YZ), pp. 545–550.
DACDAC-2015-GuoDJFM #formal method #perspective #security #validation #verification
Pre-silicon security verification and validation: a formal perspective (XG, RGD, YJ, FF, PM), p. 6.
DACDAC-2015-KimLRJR
Vibration-based secure side channel for medical devices (YK, WSL, VR, NKJ, AR), p. 6.
DACDAC-2015-LiuWLCWBQ #challenge #design #security
Cloning your mind: security challenges in cognitive system designs and their solutions (BL, CW, HL, YC, QW, MB, QQ), p. 5.
DACDAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using
Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
DACDAC-2015-Peeters #architecture #security
SoC security architecture: current practices and emerging needs (EP), p. 6.
DACDAC-2015-RayYBB #correctness #design #security #validation
Correctness and security at odds: post-silicon validation of modern SoC designs (SR, JY, AB, SB), p. 6.
DACDAC-2015-SadeghiWW #challenge #industrial #internet #privacy #security
Security and privacy challenges in industrial internet of things (ARS, CW, MW), p. 6.
DACDAC-2015-ShreejithF #embedded #generative #network #security
Security aware network controllers for next generation automotive embedded systems (SS, SAF), p. 6.
DACDAC-2015-WachsI #challenge #design #hardware #integration #security
Design and integration challenges of building security hardware IP (MW, DI), p. 6.
DACDAC-2015-ZhengLDGZS #design #security #verification
Design and verification for transportation system security (BZ, WL, PD, LG, QZ, NS), p. 6.
DATEDATE-2015-LeeLMHP #monitoring #named #security
Extrax: security extension to extract cache resident information for snoop-based external monitors (JL, YL, HM, IH, YP), pp. 151–156.
DATEDATE-2015-MacherSBAK #analysis #named
SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
DATEDATE-2015-MundhenkSLFC #authentication #lightweight #network
Lightweight authentication for secure automotive networks (PM, SS, ML, SAF, SC), pp. 285–288.
DATEDATE-2015-TangAKP #communication #configuration management
Dynamic reconfigurable puncturing for secure wireless communication (LT, JAA, AK, SP), pp. 888–891.
SIGMODSIGMOD-2015-LallaliAPP
A Secure Search Engine for the Personal Cloud (SL, NA, ISP, PP), pp. 1445–1450.
SIGMODSIGMOD-2015-OktayMKK #hybrid #named #performance #pipes and filters
SEMROD: Secure and Efficient MapReduce Over HybriD Clouds (KYO, SM, VK, MK), pp. 153–166.
VLDBVLDB-2015-HeWKCLYL #named #query
SDB: A Secure Query Processing System with Data Interoperability (ZH, WKW, BK, DWLC, RL, SMY, EL), pp. 1876–1887.
ITiCSEITiCSE-2015-AlshammariAH #adaptation #education #learning #security
The Impact of Learning Style Adaptivity in Teaching Computer Security (MA, RA, RJH), pp. 135–140.
TACASTACAS-2015-ArmandoBCCMMM #framework #mobile #named #security #static analysis #verification
SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform (AA, GB, GC, GC, GDM, RM, AM), pp. 225–230.
SANERSANER-2015-CadariuBVD #security
Tracking known security vulnerabilities in proprietary software systems (MC, EB, JV, AvD), pp. 516–519.
SCAMSCAM-2015-RenatusBE #modelling #security #using
Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
PLDIPLDI-2015-JohnsonWMC #dependence #graph #security
Exploring and enforcing security guarantees via program dependence graphs (AJ, LW, SM, SC), pp. 291–302.
CIAACIAA-2015-DangDFH #automaton #security
Security of Numerical Sensors in Automata (ZD, DD, TRF, WJHI), pp. 76–88.
ICALPICALP-v2-2015-GoldwasserKP #adaptation #revisited
Adaptively Secure Coin-Flipping, Revisited (SG, YTK, SP), pp. 663–674.
ICALPICALP-v2-2015-Raykov
Broadcast from Minicast Secure Against General Adversaries (PR), pp. 701–712.
FMFM-2015-LiSLD #protocol #security #verification
Verifying Parameterized Timed Security Protocols (LL, JS, YL, JSD), pp. 342–359.
FMFM-2015-LiuH #analysis #android #case study #kernel #security
Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
SEFMSEFM-2015-LarmuseauC #formal method #interface
Formalizing a Secure Foreign Function Interface (AL, DC), pp. 215–230.
CHICHI-2015-EgelmanP #behaviour #scalability #security
Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) (SE, EP), pp. 2873–2882.
CHICHI-2015-HangLH #authentication #exclamation #security #smarttech #what
I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones (AH, ADL, HH), pp. 1383–1392.
CHICHI-2015-IsmailAKR #crowdsourcing #security
Crowdsourced Exploration of Security Configurations (QI, TA, AK, MKR), pp. 467–476.
CHICHI-2015-MeutznerGK #difference
Constructing Secure Audio CAPTCHAs by Exploiting Differences between Humans and Machines (HM, SG, DK), pp. 2335–2338.
CHICHI-2015-WinklerGLHSDR #security #smarttech
Glass Unlock: Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye Display (CW, JG, ADL, GH, PS, DD, ER), pp. 1407–1410.
CHICHI-2015-ZezschwitzLBH #named #performance #smarttech
SwiPIN: Fast and Secure PIN-Entry on Smartphones (EvZ, ADL, BB, HH), pp. 1403–1406.
CSCWCSCW-2015-DasKDH #security #social
The Role of Social Influence in Security Feature Adoption (SD, ADIK, LAD, JIH), pp. 1416–1426.
HCIHCI-DE-2015-SugiuraSO #implementation #metric #security #using
Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
HCIHCI-DE-2015-Uchida #approach #security
A Psychological Approach to Information Security — Some Ideas for Establishing Information Security Psychology (KU), pp. 96–104.
HCIHCI-UC-2015-FukuzawaSU #bibliography #risk management #security
Survey on Risk Management Based on Information Security Psychology (YF, MS, HU), pp. 396–408.
HCIHIMI-IKD-2015-TrevisanPMG #big data #health #industrial #problem #security #visualisation
Big Data Visualization for Occupational Health and Security Problem in Oil and Gas Industry (DGT, NSP, LM, ACBG), pp. 46–54.
ICEISICEIS-v1-2015-YakhyaevaY #algorithm
An Algorithm to Compare Computer-security Knowledge from Different Sources (GY, OY), pp. 565–572.
ICEISICEIS-v2-2015-BarbarI #named
BlueKey — A Bluetooth Secure Solution for Accessing Personal Computers (AB, AI), pp. 509–515.
ICEISICEIS-v2-2015-MazurKW #data access #modelling #on the #performance #security
On the Modelling of the Influence of Access Control Management to the System Security and Performance (KM, BK, AW), pp. 346–354.
ICMLICML-2015-XiaoBBFER #feature model #question
Is Feature Selection Secure against Training Data Poisoning? (HX, BB, GB, GF, CE, FR), pp. 1689–1698.
SEKESEKE-2015-FaniB #ontology #security
An Ontology for Describing Security Events (HF, EB), pp. 455–460.
SEKESEKE-2015-HuangWSQ #android #fine-grained #named #policy #security
DefDroid: Securing Android with Fine-Grained Security Policy (CH, SW, HS, ZQ), pp. 375–378.
SEKESEKE-2015-PereiraRA #data access #database #distributed #stack
Secure, Dynamic and Distributed Access Control Stack for Database Applications (ÓMP, DDR, RLA), pp. 364–369.
SEKESEKE-2015-XuB #multi #reliability #using
A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
SIGIRSIGIR-2015-YangS #information retrieval #privacy #security
Privacy-Preserving IR 2015: When Information Retrieval Meets Privacy and Security (HY, IS), pp. 1157–1158.
MoDELSMoDELS-2015-NguyenYHKST #design pattern #named #security
SoSPa: A system of Security design Patterns for systematically engineering secure systems (PHN, KY, TH, JK, RS, YLT), pp. 246–255.
OnwardOnward-2015-ArztNABEM #encryption #integration #towards
Towards secure integration of cryptographic software (SA, SN, KA, EB, SE, MM), pp. 1–13.
QAPLQAPL-2015-MartinelliMS #security #specification
Semiring-based Specification Approaches for Quantitative Security (FM, IM, FS), pp. 95–109.
PADLPADL-2015-BalducciniKS #semantics
Ontology-Driven Data Semantics Discovery for Cyber-Security (MB, SK, JS), pp. 1–16.
POPLPOPL-2015-NgoMMP #black box #policy #runtime #security #source code
Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
REFSQREFSQ-2015-GramaticaLMPT #assessment #empirical #risk management #security
The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
REFSQREFSQ-2015-LiHM #requirements #security #specification
Analyzing and Enforcing Security Mechanisms on Requirements Specifications (TL, JH, JM), pp. 115–131.
SACSAC-2015-BeckersHMG #internet #security
Engineering trust- and reputation-based security controls for future internet systems (KB, MH, FM, MCFG), pp. 1344–1349.
SACSAC-2015-OliveiraLV #framework #performance #security #web #web service
Characterizing the performance of web service frameworks under security attacks (RAO, NL, MV), pp. 1711–1718.
SACSAC-2015-PiMMG #analysis #health #ontology #security
Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
SACSAC-2015-ShahriarH #approach #assessment #metric #risk management #security #web
Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
SACSAC-2015-TambeN #behaviour #game studies #modelling #resource management #robust #security
Robust resource allocation in security games and ensemble modeling of adversary behavior (AT, TN), pp. 277–282.
SACSAC-2015-VecchiatoVM #android #assessment #security
A security configuration assessment for android devices (DV, MV, EM), pp. 2299–2304.
SACSAC-2015-WangYCDGW #documentation #named #physics #security
Cryptopaper: digital information security for physical documents (PW, XY, SC, PD, SG, TW), pp. 2157–2164.
ESEC-FSEESEC-FSE-2015-Feth #optimisation #security #trade-off
User-centric security: optimization of the security-usability trade-off (DF), pp. 1034–1037.
ESEC-FSEESEC-FSE-2015-GhaisasMBGKV #automation #security #towards
Towards automating the security compliance value chain (SG, MM, BB, AG, RK, HMV), pp. 1014–1017.
ESEC-FSEESEC-FSE-2015-SmithJMCL #developer #security #static analysis
Questions developers ask while diagnosing potential security vulnerabilities with static analysis (JS, BJ, ERMH, BC, HRL), pp. 248–259.
ESEC-FSEESEC-FSE-2015-WitscheyZWMMZ #developer #security #tool support
Quantifying developers’ adoption of security tools (JW, OZ, AKW, ERMH, CBM, TZ), pp. 260–271.
ICSEICSE-v1-2015-YskoutSJ #design #question #security
Do Security Patterns Really Help Designers? (KY, RS, WJ), pp. 292–302.
ICSEICSE-v2-2015-Berghe #analysis #security #towards
Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
ICSEICSE-v2-2015-DoligezFHM #development #functional #programming #security #validation #xml
Avoiding Security Pitfalls with Functional Programming: A Report on the Development of a Secure XML Validator (DD, CF, TH, MM), pp. 209–218.
ICSEICSE-v2-2015-HollandDKMR #android #detection #novel #security
Security Toolbox for Detecting Novel and Sophisticated Android Malware (BH, TD, SK, JM, NR), pp. 733–736.
ICSEICSE-v2-2015-Morrison #evaluation #framework #security
A Security Practices Evaluation Framework (PM), pp. 935–938.
ICSEICSE-v2-2015-SadeghiBM #analysis #android #security #using
Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
ICSEICSE-v2-2015-SimpsonMCFMR #case study #education #experience #security
Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security (ACS, AM, CJFC, IF, IM, KBR), pp. 435–444.
ICSEICSE-v2-2015-TsigkanosPGN #adaptation #cyber-physical #named #security
Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems (CT, LP, CG, BN), pp. 729–732.
ASPLOSASPLOS-2015-HicksSKS #debugging #lightweight #named #runtime #specification
SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs (MH, CS, STK, JMS), pp. 517–529.
ASPLOSASPLOS-2015-ZhangWSM #data flow #design #hardware #information management #security
A Hardware Design Language for Timing-Sensitive Information-Flow Security (DZ, YW, GES, ACM), pp. 503–516.
LCTESLCTES-2015-LiuY #encryption #framework #in memory #memory management
Secure and Durable (SEDURA): An Integrated Encryption and Wear-leveling Framework for PCM-based Main Memory (CL, CY), p. 10.
ICSTICST-2015-CarboneCPP #identification #security #testing
Security Threat Identification and Testing (RC, LC, AP, SEP), pp. 1–8.
ICSTICST-2015-KobashiYWFYOK #design pattern #named #security #testing #verification
TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing (TK, MY, HW, YF, NY, TO, HK), pp. 1–8.
ISSTAISSTA-2015-DahseH #case study #empirical #experience #php #security
Experience report: an empirical study of PHP security mechanism usage (JD, TH), pp. 60–70.
ISSTAISSTA-2015-Hothersall-Thomas #automation #named #security #testing
BrowserAudit: automated testing of browser security features (CHT, SM, CN), pp. 37–47.
TAPTAP-2015-BloemHRS #automation #case study #generative #implementation #testing
Case Study: Automatic Test Case Generation for a Secure Cache Implementation (RB, DMH, FR, RS), pp. 58–75.
ECSAECSA-2014-HorcasPF #policy #runtime #security
Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
ASEASE-2014-NearJ #analysis #interactive #named #security #web
Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
ASEASE-2014-StephenSSE #big data #program analysis
Program analysis for secure big data processing (JJS, SS, RS, PTE), pp. 277–288.
DACDAC-2014-AgostaBPS #approach #embedded #encryption #execution #multi
A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software (GA, AB, GP, MS), p. 6.
DACDAC-2014-HerrewegeV
Software Only, Extremely Compact, Keccak-based Secure PRNG on ARM Cortex-M (AVH, IV), p. 6.
DACDAC-2014-HuWTT #hardware #monitoring #network #security
System-Level Security for Network Processors with Hardware Monitors (KH, TW, TT, RT), p. 6.
DACDAC-2014-KannanKS #in memory #memory management
Secure Memristor-based Main Memory (SK, NK, OS), p. 6.
DACDAC-2014-TrimbergerM #security
FPGA Security: From Features to Capabilities to Trusted Systems (ST, JM), p. 4.
DACDAC-2014-ZalmanM #communication #low cost
A Secure but still Safe and Low Cost Automotive Communication Technique (RZ, AM), p. 5.
DATEDATE-2014-CortezRHN #testing
Testing PUF-based secure key storage circuits (MC, GR, SH, GDN), pp. 1–6.
DATEDATE-2014-HanZLD #named #scheduling
SAFE: Security-Aware FlexRay Scheduling Engine (GH, HZ, YL, WD), pp. 1–4.
DATEDATE-2014-Jin #evaluation #proving #security #tool support #trust
EDA tools trust evaluation through security property proofs (YJ), pp. 1–4.
DATEDATE-2014-RostamiWPK #challenge #roadmap #security
Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security (MR, JBW, MP, FK), pp. 1–6.
DATEDATE-2014-RuhrmairSB #how
Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks (UR, US, WB), pp. 1–4.
DATEDATE-2014-SubramanyanA #design #security #verification
Formal verification of taint-propagation security properties in a commercial SoC design (PS, DA), pp. 1–2.
SIGMODSIGMOD-2014-BenderKG #database #relational #security
Explainable security for relational databases (GB, LK, JG), pp. 1411–1422.
SIGMODSIGMOD-2014-WongKCLY #database #query
Secure query processing with data interoperability in a cloud database environment (WKW, BK, DWLC, RL, SMY), pp. 1395–1406.
VLDBVLDB-2014-GuarnieriB #query
Optimal Security-Aware Query Processing (MG, DAB), pp. 1307–1318.
ITiCSEITiCSE-2014-GuoBQLH #assurance #education #security
Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs (MG, PB, KQ, CTDL, XH), p. 343.
ITiCSEITiCSE-2014-MaTKMSW #algorithm #named #visualisation
SHAvisual: a secure hash algorithm visualization tool (JM, JT, MSK, JM, CKS, CW), p. 338.
ITiCSEITiCSE-2014-SirajGTH #security #topic
Empowering faculty to embed security topics into computer science courses (AS, SG, JT, AH), pp. 99–104.
ITiCSEITiCSE-2014-WangCMSW #data access #education #multi #named #security #using #visualisation
MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
ESOPESOP-2014-LaunchburyADM #multi
Application-Scale Secure Multiparty Computation (JL, DA, TD, EM), pp. 8–26.
FASEFASE-2014-SadeghiEM #analysis #mining #repository #security
Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
TACASTACAS-2014-ArmandoCC #model checking #named #satisfiability
SATMC: A SAT-Based Model Checker for Security-Critical Systems (AA, RC, LC), pp. 31–45.
SANERCSMR-WCRE-2014-BuchlerHMMGO #model inference #security #testing
Model inference and security testing in the spacios project (MB, KH, PFM, MM, RG, CO), pp. 411–414.
SANERCSMR-WCRE-2014-MihanceaM #named #security #verification #web
JMODEX: Model extraction for verifying security properties of web applications (PFM, MM), pp. 450–453.
MSRMSR-2014-PleteaVS #analysis #git #security #sentiment
Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
SCAMSCAM-2014-TliliFBDH #scalability #security #verification
Scalable Security Verification of Software at Compile Time (ST, JMF, AB, BD, SH), pp. 115–124.
PEPMPEPM-J-2013-WeijersHH14 #fault #higher-order #polymorphism #security
Security type error diagnosis for higher-order, polymorphic languages (JW, JH, SH), pp. 200–218.
STOCSTOC-2014-GenkinIPST
Circuits resilient to additive attacks with applications to secure computation (DG, YI, MP, AS, ET), pp. 495–504.
STOCSTOC-2014-MillerS #protocol #quantum #robust #using
Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
ICALPICALP-v1-2014-PrabhakaranSW #using
Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
IFMIFM-2014-BruniSNN #analysis #protocol #security
Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
IFMIFM-2014-KordyPS #framework #probability #security
A Probabilistic Framework for Security Scenarios with Dependent Actions (BK, MP, PS), pp. 256–271.
IFMIFM-2014-RamsdellDGR #analysis #hybrid #protocol #security
A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
ICFPICFP-2014-Fisher #formal method #using
Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
CHICHI-2014-ChowdhuryPM #authentication #named
Passhint: memorable and secure authentication (SC, RP, LM), pp. 2917–2926.
CHICHI-2014-HarbachHWS #communication #privacy #security #using
Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
CHICHI-2014-ShayKDHMSUBCC #question
Can long passwords be secure and usable? (RS, SK, ALD, P(H, MLM, SMS, BU, LB, NC, LFC), pp. 2927–2936.
CHICHI-2014-VanieaRW #case study #experience #how #security
Betrayed by updates: how negative experiences affect future security (KV, EJR, RW), pp. 2671–2674.
CHICHI-2014-ZhangWKGS #mobile #security #towards
Effects of security warnings and instant gratification cues on attitudes toward mobile websites (BZ, MW, HK, EG, SSS), pp. 111–114.
CSCWCSCW-2014-XiaoWM #development #security #social #tool support #why
Social influences on secure development tool adoption: why security tools spread (SX, JW, ERMH), pp. 1095–1106.
HCIDUXU-DP-2014-GokturkS #approach #development #interface
A Perception Oriented Approach for Usable and Secure Interface Development (MG, IS), pp. 23–31.
HCIDUXU-TMT-2014-CoventryBJM #behaviour #named #security
SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment (LMC, PB, DJ, APAvM), pp. 229–239.
HCILCT-NLE-2014-LaugassonK #open source #security
File Formats Security — Proprietary vs. Open-Source (EL, KK), pp. 63–72.
CAiSECAiSE-2014-LiH #approach #requirements #security
Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach (TL, JH), pp. 285–300.
EDOCEDOC-2014-KormanSHBE #assessment #bibliography #enterprise #risk management #security
Overview of Enterprise Information Needs in Information Security Risk Assessment (MK, TS, JH, JEB, ME), pp. 42–51.
ICPRICPR-2014-KumarK #adaptation #multimodal #recognition #security #set #using
Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
ICPRICPR-2014-LetchfordGZ #security
Smoothing Security Prices (AL, JG, LZ), pp. 1037–1042.
KDDKDD-2014-Waltzman #security
Information environment security (RW), p. 1521.
KDDKDD-2014-ZhuXGC #mobile #privacy #recommendation #security
Mobile app recommendations with security and privacy awareness (HZ, HX, YG, EC), pp. 951–960.
KDIRKDIR-2014-KurasEAH #data mining #mining #security
The GDR Through the Eyes of the Stasi — Data Mining on the Secret Reports of the State Security Service of the former German Democratic Republic (CK, TE, CA, GH), pp. 360–365.
KEODKEOD-2014-KruppS0 #mobile #ontology #policy #privacy #security
An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
KMISKMIS-2014-DaviesB #security
Determining the Value of Information Security Investments — A Decision Support System (HLD, AJCB), pp. 426–433.
SEKESEKE-2014-BakerS #architecture #aspect-oriented #implementation
Aspect-Oriented Secure Connectors for Implementation of Secure Software Architecture (CB, MS), pp. 187–192.
SEKESEKE-2014-El-KharboutlyGF #analysis #security
Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
SEKESEKE-2014-SantosRBC #elicitation #requirements #security
Persona Security: A Technique for Supporting the Elicitation of Security Requirements (MADS, JR, RdSB, TC), pp. 603–608.
SIGIRSIGIR-2014-SiY #information retrieval #privacy #security
Privacy-preserving IR: when information retrieval meets privacy and security (LS, HY), p. 1295.
PLATEAUPLATEAU-2014-KurilovaPA #design #named #programming language #security
Wyvern: Impacting Software Security via Programming Language Design (DK, AP, JA), pp. 57–58.
POPLPOPL-2014-SwamyFRBCSB #embedded #javascript #type system
Gradual typing embedded securely in JavaScript (NS, CF, AR, KB, JC, PYS, GMB), pp. 425–438.
RERE-2014-Anton #privacy #security
Now more than ever: Privacy and security are required (keynote) (AIA), p. 2.
RERE-2014-GartnerRBSJ #maintenance #requirements #security
Maintaining requirements for long-living software systems by incorporating security knowledge (SG, TR, JB, KS, JJ), pp. 103–112.
RERE-2014-Ionita #evaluation #identification #information management #risk management #security
Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
RERE-2014-RiazKSW #automation #identification #natural language #requirements #security
Hidden in plain sight: Automatically identifying security requirements from natural language artifacts (MR, JTK, JS, LAW), pp. 183–192.
RERE-2014-SlavinLNB #diagrams #feature model #requirements #security #using
Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
RERE-2014-TsigkanosPMGN #adaptation #requirements #runtime #security
Engineering topology aware adaptive security: Preventing requirements violations at runtime (CT, LP, CM, CG, BN), pp. 203–212.
SACSAC-2014-BeckersCG #in the cloud #requirements #security
A catalog of security requirements patterns for the domain of cloud computing systems (KB, IC, LG), pp. 337–342.
SACSAC-2014-EmuraKOT #communication #formal method #implementation #prototype
Building secure and anonymous communication channel: formal model and its prototype implementation (KE, AK, SO, TT), pp. 1641–1648.
SACSAC-2014-OliveiraNWB #approach #kernel #named
Ianus: secure and holistic coexistence with kernel extensions — a immune system-inspired approach (DO, JN, NW, MB), pp. 1672–1679.
SACSAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
SACSAC-2014-TesfayHBO #architecture #communication #network
Cyber-secure communication architecture for active power distribution networks (TTT, JPH, JYLB, PO), pp. 545–552.
SACSAC-2014-TupakulaV #monitoring
Secure monitoring for dementia patients (UKT, VV), pp. 14–19.
SACSAC-2014-YokoyamaKM #using
Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
ASPLOSASPLOS-2014-0001KOTRKSHC #named #policy #security
Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
CCCC-2014-FranzHKSV #c #compilation #named
CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations (MF, AH, SK, CS, HV), pp. 244–249.
CGOCGO-2014-KashyapH #security
Security Signature Inference for JavaScript-based Browser Addons (VK, BH), p. 219.
OSDIOSDI-2014-HawblitzelHLNPZZ #automation #security #verification
Ironclad Apps: End-to-End Security via Automated Full-System Verification (CH, JH, JRL, AN, BP, DZ, BZ), pp. 165–181.
OSDIOSDI-2014-MooreDKC #named #scripting language
SHILL: A Secure Shell Scripting Language (SM, CD, DK, SC), pp. 183–199.
ICSTICST-2014-PotetMPD #approach #control flow #evaluation #injection #named #robust
Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
ICTSSICTSS-2014-WotawaB #automation #exclamation #security #testing
Plan It! Automated Security Testing Based on Planning (FW, JB), pp. 48–62.
ISSTAISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web
Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
LICSLICS-CSL-2014-BruyereMR #game studies
Secure equilibria in weighted games (VB, NM, JFR), p. 26.
CASECASE-2013-ZhangPJST #energy #interface #monitoring #scalability #using
A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
DACDAC-2013-FanRRV #design #encryption #energy #security
Low-energy encryption for medical devices: security adds an extra design dimension (JF, OR, VR, IV), p. 6.
DACDAC-2013-RostamiBKJ #question #security
Balancing security and utility in medical devices? (MR, WB, FK, AJ), p. 6.
DACDAC-2013-WangYRNZMMB #design #grid #power management
Role of power grid in side channel attack and power-grid-aware secure design (XW, WY, DBR, SN, YZ, SM, DM, SB), p. 9.
DACDAC-2013-YinQ #security
Improving PUF security with regression-based distiller (CEDY, GQ), p. 6.
DATEDATE-2013-DiazSSR #analysis #network #performance #security #simulation
Wireless sensor network simulation for security and performance analysis (AD, PS, JS, JR), pp. 432–435.
DATEDATE-2013-JiangEP #embedded #optimisation #set
Optimization of secure embedded systems with dynamic task sets (KJ, PE, ZP), pp. 1765–1770.
DATEDATE-2013-LeestT #hardware #security
Anti-counterfeiting with hardware intrinsic security (VvdL, PT), pp. 1137–1142.
DATEDATE-2013-RajendranSK #question
Is split manufacturing secure? (JR, OS, RK), pp. 1259–1264.
DATEDATE-2013-SagstetterLSWBHJPPC #architecture #challenge #design #hardware #security
Security challenges in automotive hardware/software architecture design (FS, ML, SS, MW, AB, WRH, SJ, TP, AP, SC), pp. 458–463.
SIGMODSIGMOD-2013-ArasuBEJKKRUV #as a service
Secure database-as-a-service with Cipherbase (AA, SB, KE, MJ, RK, DK, RR, PU, RV), pp. 1033–1036.
VLDBVLDB-2013-Kozak #performance #security #similarity
Efficiency and Security in Similarity Cloud Services (SK), pp. 1450–1455.
ITiCSEITiCSE-2013-PatitsasL #security
Dr. Horrible’s fork bomb: a lab for introducing security issues in CS2 (EAP, DL), p. 318.
ITiCSEITiCSE-2013-QianYGBT #authentication #learning #mobile #network #security
Mobile device based authentic learning for computer network and security (KQ, MY, MG, PB, LT), p. 335.
FASEFASE-2013-TrippPCCG #analysis #named #scalability #security #web
Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
CSMRCSMR-2013-BergerSK #architecture #security
Extracting and Analyzing the Implemented Security Architecture of Business Applications (BJB, KS, RK), pp. 285–294.
PEPMPEPM-2013-WeijersHH #fault #higher-order #polymorphism #security
Security type error diagnosis for higher-order, polymorphic languages (JW, JH, SH), pp. 3–12.
PLDIPLDI-2013-Schneider #programming language #security
Programming languages in security: keynote (FBS), pp. 139–140.
STOCSTOC-2013-ChungPS #security #simulation
Non-black-box simulation from one-way functions and applications to resettable security (KMC, RP, KS), pp. 231–240.
ICALPICALP-v2-2013-ChretienCD #automaton #protocol #security
From Security Protocols to Pushdown Automata (RC, VC, SD), pp. 137–149.
ICALPICALP-v2-2013-LipmaaT #complexity #online #similarity #sublinear #testing
Secure Equality and Greater-Than Tests with Sublinear Online Complexity (HL, TT), pp. 645–656.
IFMIFM-2013-VigoNN #communication
Broadcast, Denial-of-Service, and Secure Communication (RV, FN, HRN), pp. 412–427.
SEFMSEFM-2013-BorekMSR #approach #model checking #modelling
Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
IFLIFL-2013-FowlerB #dependent type #programming #web
Dependent Types for Safe and Secure Web Programming (SF, EB), p. 49.
CHICHI-2013-LucaZPH #using
Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
CHICHI-2013-ThiemeWJMLWOM #design #women
Design to promote mindfulness practice and sense of self for vulnerable women in secure hospital services (AT, JW, PJ, JCM, SEL, PCW, PO, TDM), pp. 2647–2656.
HCIDUXU-NTE-2013-Langhorne #evaluation #online #security
Department of Homeland Security Websites Uncoupled: An Evaluation of Online Counterterrorism and Security Information across Agencies (ALL), pp. 112–119.
HCIHCI-UC-2013-Acharya #named #privacy
SP-CIP: A Secure and Privacy Aware Patient Centric Information Portal (SA), pp. 3–9.
HCIHIMI-D-2013-LiaoLH #concept #modelling #ontology #perspective #security #towards
Towards an Ontological Interpretation on the i* Modeling Language Extended with Security Concepts: A Bunge-Wand-Weber Model Perspective (GYL, PJL, LTH), pp. 322–328.
HCIHIMI-HSM-2013-MoodyW #mobile #security #what
Security, But at What Cost? — An Examination of Security Notifications within a Mobile Application (GM, DW), pp. 391–399.
HCIOCSC-2013-KaratasBK #security #towards #visual notation
Towards Visual Configuration Support for Interdependent Security Goals (FK, MB, DK), pp. 375–384.
AdaEuropeAdaEurope-2013-FaginC #case study #reliability
Provably Secure DNS: A Case Study in Reliable Software (BSF, MCC), pp. 81–93.
CAiSECAiSE-2013-BarhamgiBOCCMT #execution #privacy
Secure and Privacy-Preserving Execution Model for Data Services (MB, DB, SO, NCB, FC, MM, HT), pp. 35–50.
ICEISICEIS-J-2013-SuB13a #fine-grained #graph #identification #security
Foundation for Fine-Grained Security and DRM Control Based on a Service Call Graph Context Identification (ZS, FB), pp. 226–241.
ICEISICEIS-v2-2013-DelgadoORHG #information management #security #social
Proposal of an Interoperability Model for Social Security Information Systems (FDA, SO, RJR, JRH, JMG), pp. 451–458.
ICEISICEIS-v3-2013-NassarBBB #architecture #design #security #towards
Towards Security Awareness in Designing Service-oriented Architectures (PBN, YB, FB, KB), pp. 347–355.
KDDKDD-2013-Marty #how #security #visual notation
Cyber security: how visual analytics unlock insight (RM), p. 1139.
KDIRKDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security #using
Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
KDIRKDIR-KMIS-2013-Hugl #challenge #security
Crying for the Moon? — Current Challenges in Corporate Information Security Management (UH), pp. 579–586.
SEKESEKE-2013-AlshammariFC #bytecode #java #metric #security #source code
Security Metrics for Java Bytecode Programs (S) (BA, CJF, DC), pp. 394–399.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
MODELSMoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
OnwardOnward-2013-ValleeWZFK #modelling #problem #reasoning #security
Usable security as a static-analysis problem: modeling and reasoning about user permissions in social-sharing systems (HQdlV, JMW, WZ, KF, SK), pp. 1–16.
OOPSLAOOPSLA-2013-TetaliLMM #named #static analysis
MrCrypt: static analysis for secure cloud computations (SDT, ML, RM, TDM), pp. 271–286.
QAPLQAPL-2013-NgoH #analysis #concurrent #multi #security #source code #thread
Quantitative Security Analysis for Multi-threaded Programs (TMN, MH), pp. 34–48.
POPLPOPL-2013-LivshitsC #automation #classification #security #towards
Towards fully automatic placement of security sanitizers and declassifiers (BL, SC), pp. 385–398.
SACSAC-2013-AccorsiSM #mining #on the #process #security
On the exploitation of process mining for security audits: the process discovery case (RA, TS, GM), pp. 1462–1468.
SACSAC-2013-ArmandoCM
Bring your own device, securely (AA, GC, AM), pp. 1852–1858.
SACSAC-2013-CampioloSBG #security #twitter
Evaluating the utilization of Twitter messages as a source of security alerts (RC, LAFS, DMB, MAG), pp. 942–943.
SACSAC-2013-CarlosMPC #security
An updated threat model for security ceremonies (MCC, JEM, GP, RFC), pp. 1836–1843.
SACSAC-2013-EgnersM #framework #multi
Secure roaming and infrastructure sharing for multi-operator WMNs (AE, UM), pp. 1800–1807.
SACSAC-2013-HunnyZW #adaptation #named
OSDC: adapting ODC for developing more secure software (UH, MZ, KW), pp. 1131–1136.
SACSAC-2013-JeonKKC #android #security
Enhancing security enforcement on unmodified Android (CJ, WK, BK, YC), pp. 1655–1656.
SACSAC-2013-KaratasK #approach #composition #flexibility #security
A flexible approach for considering interdependent security objectives in service composition (FK, DK), pp. 1919–1926.
SACSAC-2013-MartinaP #induction #multi #protocol #security #using #verification
Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
SACSAC-2013-ShinYR #android #security #visual notation
Supporting visual security cues for WebView-based Android apps (DS, HY, UR), pp. 1867–1876.
SACSAC-2013-TranLZ #architecture #metadata #security
Derivation of domain-specific architectural knowledge views from governance and security compliance metadata (HT, IL, UZ), pp. 1728–1733.
SACSAC-2013-VukovicD #distributed #estimation #on the #security
On the security of distributed power system state estimation under targeted attacks (OV, GD), pp. 666–672.
ICSEICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
ICSEICSE-2013-Rimba #assurance #security #using
Building high assurance secure applications using security patterns for capability-based platforms (PR), pp. 1401–1404.
ASPLOSASPLOS-2013-HofmannKDLW #named #operating system
InkTag: secure applications on an untrusted operating system (OSH, SK, AMD, MZL, EW), pp. 265–278.
ASPLOSASPLOS-2013-MaiPXKM #invariant #security #verification
Verifying security invariants in ExpressOS (HM, EP, HX, STK, PM), pp. 293–304.
CGOCGO-2013-ArthurMRAB #debugging #named #profiling #scalability #security
Schnauzer: scalable profiling for likely security bug sites (WA, BM, RR, TMA, VB), p. 11.
CGOCGO-2013-RodriguesCP #integer #performance #source code
A fast and low-overhead technique to secure programs against integer overflows (RER, VHSC, FMQP), p. 11.
CAVCAV-2013-BiondiLTW #imperative #named #security
QUAIL: A Quantitative Security Analyzer for Imperative Code (FB, AL, LMT, AW), pp. 702–707.
CAVCAV-2013-MeierSCB #analysis #protocol #proving #security
The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
CAVCAV-2013-SosnovichGN #network #protocol #security #using
Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
ICSTICST-2013-Buchler #security #testing
Security Testing with Fault-Models and Properties (MB), pp. 501–502.
ICSTICST-2013-CompagnaGB #as a service #process #security #validation
Business Process Compliance via Security Validation as a Service (LC, PG, ADB), pp. 455–462.
ICSTICST-2013-MunetohY #agile #development #framework #named #security #testing
RAILROADMAP: An Agile Security Testing Framework for Web-application Development (SM, NY), pp. 491–492.
ICSTICST-2013-Vigano #internet
The SPaCIoS Project: Secure Provision and Consumption in the Internet of Services (LV), pp. 497–498.
ICTSSICTSS-2013-PellegrinoCM #developer #protocol #security
A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols (GP, LC, TM), pp. 277–282.
ISSTAISSTA-2013-TrippWG #approach #learning #security #testing #web
Finding your way in the testing jungle: a learning approach to web security testing (OT, OW, LG), pp. 347–357.
LICSLICS-2013-Comon-Lundh #logic #modelling #named #problem #security
LICS: Logic in Computer Security — Some Attacker’s Models and Related Decision Problems (HCL), p. 1.
LICSLICS-2013-Halpern #first-order #logic #proving #security #using
From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic (JYH), pp. 2–3.
CBSECBSE-2012-AnneAVP #composition #named
Jasmin: an alternative for secure modularity inside the digital home (MA, KA, DHdV, JP), pp. 145–150.
WICSA-ECSAWICSA-ECSA-2012-Al-AzzaniB #architecture #evaluation #named #security #testing
SecArch: Architecture-level Evaluation and Testing for Security (SAA, RB), pp. 51–60.
WICSA-ECSAWICSA-ECSA-2012-HeymanSJ #architecture #formal method #modelling #reuse
Reusable Formal Models for Secure Software Architectures (TH, RS, WJ), pp. 41–50.
ASEASE-2012-BartelKTM #android #automation
Automatically securing permission-based software by reducing the attack surface: an application to Android (AB, JK, YLT, MM), pp. 274–277.
ASEASE-2012-HwangXKMT #evolution #policy #security #testing
Selection of regression system tests for security policy evolution (JH, TX, DEK, TM, YLT), pp. 266–269.
DACDAC-2012-BurlesonCRF #challenge #design
Design challenges for secure implantable medical devices (WB, SSC, BR, KF), pp. 12–17.
DACDAC-2012-KoushanfarSS #challenge
EDA for secure and dependable cybercars: challenges and opportunities (FK, ARS, HS), pp. 220–228.
DACDAC-2012-RajendranPSK #analysis #logic #obfuscation #security
Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
DATEDATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using
SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
DATEDATE-2012-DasKSV #design #encryption #testing
PUF-based secure test wrapper design for cryptographic SoC testing (AD, ÜK, ARS, IV), pp. 866–869.
DATEDATE-2012-JiangEP #co-evolution #communication #constraints #design #distributed #embedded #realtime #security
Co-design techniques for distributed real-time embedded systems with communication security constraints (KJ, PE, ZP), pp. 947–952.
DATEDATE-2012-NassarSGD #named #performance
RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs (MN, YS, SG, JLD), pp. 1173–1178.
VLDBVLDB-2012-AgrawalAW #in the cloud #perspective #privacy
Secure and Privacy-Preserving Data Services in the Cloud: A Data Centric View (DA, AEA, SW), pp. 2028–2029.
ITiCSEITiCSE-2012-BrownCDGHMNPPSSSSS #education
Anatomy, dissection, and mechanics of an introductory cyber-security course’s curriculum at the United States naval academy (CB, FC, RD, RG, CH, JM, DN, AP, AP, SS, JS, SS, DS, SS), pp. 303–308.
TACASTACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #security #trust #validation
The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
STOCSTOC-2012-BoyleGJK #memory management #multi
Multiparty computation secure against continual memory leakage (EB, SG, AJ, YTK), pp. 1235–1254.
STOCSTOC-2012-VaziraniV #generative #quantum #random
Certifiable quantum dice: or, true random number generation secure against quantum adversaries (UVV, TV), pp. 61–76.
FMFM-2012-Abadi #formal method #security
Software Security: A Formal Perspective — (Notes for a Talk) (MA), pp. 1–5.
SEFMSEFM-2012-BistarelliS #concurrent #constraints #programming
Securely Accessing Shared Resources with Concurrent Constraint Programming (SB, FS), pp. 308–322.
SEFMSEFM-2012-VorobyovKS #approach #data flow #security
A Low-Overhead, Value-Tracking Approach to Information Flow Security (KV, PK, PS), pp. 367–381.
ICFPICFP-2012-LaunchburyDDA #multi #performance #protocol
Efficient lookup-table protocol in secure multiparty computation (JL, ISD, TD, AAM), pp. 189–200.
CHICHI-2012-BullingAS #security #using #visual notation
Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
CHICHI-2012-XieLC #interactive #programming
Evaluating interactive support for secure programming (JX, HRL, BtC), pp. 2707–2716.
CSCWCSCW-2012-ChiaC #security #web
Community-based web security: complementary roles of the serious and casual contributors (PHC, JC), pp. 1023–1032.
HILTHILT-2012-HardinSWP #domain-specific language #security
A DSL for cross-domain security (DSH, KS, MWW, THP), pp. 53–62.
ICPRICPR-2012-MaLWZH #authentication #multimodal #security
Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication (BM, CL, YW, ZZ, DH), pp. 2416–2419.
KDIRKDIR-2012-Martiny #security
Unsupervised Discovery of Significant Candlestick Patterns for Forecasting Security Price Movements (KM), pp. 145–150.
KEODKEOD-2012-PereiraS #approach #design #information management #ontology #security
An Ontology Approach in Designing Security Information Systems to Support Organizational Security Risk Knowledge (TSMP, HMDS), pp. 461–466.
SEKESEKE-2012-ChenL #approach #behaviour #elicitation #ontology #requirements #security
Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
SEKESEKE-2012-FitchX #fault tolerance #petri net
A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage (DFF, HX), pp. 333–339.
SEKESEKE-2012-MaarabaniAC #policy #security #testing
Testing Interoperability Security Policies (MEM, CA, ARC), pp. 464–469.
SEKESEKE-2012-ShinMGK #architecture
Connectors for Secure Software Architectures (MES, BM, HG, TK), pp. 394–399.
OnwardOnward-2012-HafizAJ #pattern matching #security
Growing a pattern language (for security) (MH, PA, REJ), pp. 139–158.
OOPSLAOOPSLA-2012-MullerC #concurrent #towards
Towards a practical secure concurrent language (SM, SC), pp. 57–74.
RERE-2012-PajaDPRG #named #requirements #security #social
STS-tool: Socio-technical Security Requirements through social commitments (EP, FD, MP, PR, PG), pp. 331–332.
RERE-2012-SalehiePOAN #adaptation #runtime #security
Requirements-driven adaptive security: Protecting variable assets at runtime (MS, LP, IO, RA, BN), pp. 111–120.
RERE-2012-TawhidBCAMSABR #security #towards
Towards outcome-based regulatory compliance in aviation security (RT, EB, NC, MA, GM, AS, DA, SAB, GR), pp. 267–272.
REFSQREFSQ-2012-ChowdhuryMSK #diagrams #requirements #risk management #security
Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions (MJMC, RM, GS, PK), pp. 132–139.
SACSAC-2012-AccorsiS #consistency #mining #on the #process #security
On the exploitation of process mining for security audits: the conformance checking case (RA, TS), pp. 1709–1716.
SACSAC-2012-BalduzziZBKL #analysis #security
A security analysis of amazon’s elastic compute cloud service (MB, JZ, DB, EK, SL), pp. 1427–1434.
SACSAC-2012-BeusterG #modelling #policy #security #smarttech
Formal security policy models for smart card evaluations (GB, KG), pp. 1640–1642.
SACSAC-2012-BistarelliCS #concurrent #constraints #coordination #programming
A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming (SB, PC, FS), pp. 1551–1553.
SACSAC-2012-MonakovaBS #process #safety #security
Security and safety of assets in business processes (GM, ADB, AS), pp. 1667–1673.
SACSAC-2012-RodoperBJT #framework #mobile #performance #security
An efficient security framework for mobile WiMAX (MR, AB, EJ, WT), pp. 1494–1501.
FSEFSE-2012-PasqualeMSCON #adaptation #named #security
SecuriTAS: a tool for engineering adaptive security (LP, CM, MS, LC, IO, BN), p. 19.
FSEFSE-2012-XiaoPTX #automation #documentation #policy #security
Automated extraction of security policies from natural-language software documents (XX, AMP, ST, TX), p. 12.
ICSEICSE-2012-Avancini #research #security #testing #web
Security testing of web applications: A research plan (AA), pp. 1491–1494.
ICSEICSE-2012-Rodes #layout #source code #stack #towards
Stack layout transformation: Towards diversity for securing binary programs (BR), pp. 1543–1546.
ICSEICSE-2012-YskoutSJ #architecture #question #security
Does organizing security patterns focus architectural choices? (KY, RS, WJ), pp. 617–627.
ASPLOSASPLOS-2012-SzeferL #architecture
Architectural support for hypervisor-secure virtualization (JS, RBL), pp. 437–450.
OSDIOSDI-2012-KotlaRRSW #data access #hardware #named #using
Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
OSDIOSDI-2012-WangCJZK #integer #security
Improving Integer Security for Systems with KINT (XW, HC, ZJ, NZ, MFK), pp. 163–177.
CAVCAV-2012-HarrisJR #automaton #game studies #programming #safety
Secure Programming via Visibly Pushdown Safety Games (WRH, SJ, TWR), pp. 581–598.
ICSTICST-2012-ChoudharyDBJOI #challenge #internet #modelling #security #testing
Solving Some Modeling Challenges when Testing Rich Internet Applications for Security (SC, MED, GvB, GVJ, IVO, PI), pp. 850–857.
ICSTICST-2012-Kannavara #source code #static analysis
Securing Opensource Code via Static Analysis (RK), pp. 429–436.
ICSTICST-2012-WehbiOB #monitoring #security #using
Events-Based Security Monitoring Using MMT Tool (BW, EMdO, MB), pp. 860–863.
IJCARIJCAR-2012-DelauneKP #constraints #protocol #security
Security Protocols, Constraint Systems, and Group Theories (SD, SK, DP), pp. 164–178.
TAPTAP-2012-ArmandoPCMB #automation #model checking #protocol #security #testing
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap (AA, GP, RC, AM, DB), pp. 3–18.
QoSAQoSA-ISARCS-2011-ArissX #modelling #security
Modeling security attacks with statecharts (OeA, DX), pp. 123–132.
QoSAQoSA-ISARCS-2011-KhanZ #component #embedded #monitoring #security
Building components with embedded security monitors (MUAK, MZ), pp. 133–142.
WICSAWICSA-2011-FaniyiBEK #architecture #predict #security
Evaluating Security Properties of Architectures in Unpredictable Environments: A Case for Cloud (FF, RB, AE, RK), pp. 127–136.
DACDAC-2011-Kocher #challenge #complexity
Complexity and the challenges of securing SoCs (PK), pp. 328–331.
DACDAC-2011-WeiP #security #using
Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
DATEDATE-2011-AliCMB #encryption #hardware #multi #security
Multi-level attacks: An emerging security concern for cryptographic hardware (SA, RSC, DM, SB), pp. 1176–1179.
DATEDATE-2011-PorquetGS #architecture #flexibility #memory management #named
NoC-MPU: A secure architecture for flexible co-hosting on shared memory MPSoCs (JP, AG, CS), pp. 591–594.
DATEDATE-2011-SreedharK11a #security
Physically unclonable functions for embeded security based on lithographic variation (AS, SK), pp. 1632–1637.
DocEngDocEng-2011-BalinskyS #documentation
Secure document engineering (HB, SJS), pp. 269–272.
CSEETCSEET-2011-ChookittikulM #collaboration #effectiveness #security
Effective real-world project collaboration: Strategies from a cyber security degree program (WC, PEM), pp. 429–433.
ITiCSEITiCSE-2011-GuimaraesSA #education #game studies #security #using #video
Using video games to teach security (MAMG, HES, RA), p. 346.
ITiCSEITiCSE-2011-TaylorK #injection #security #student
Security injections: modules to help students remember, understand, and apply secure coding techniques (BT, SK), pp. 3–7.
ESOPESOP-2011-FournetP #compilation #data flow #security
Compiling Information-Flow Security to Minimal Trusted Computing Bases (CF, JP), pp. 216–235.
ESOPESOP-2011-HuntS #exponential #polynomial #security #type system
From Exponential to Polynomial-Time Security Typing via Principal Types (SH, DS), pp. 297–316.
ESOPESOP-2011-JensenKP #policy
Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
FASEFASE-2011-HateburHJS #design #development #modelling #requirements #security
Systematic Development of UMLsec Design Models Based on Security Requirements (DH, MH, JJ, HS), pp. 232–246.
MSRMSR-2011-ZamanAH #case study #debugging #performance #security
Security versus performance bugs: a case study on Firefox (SZ, BA, AEH), pp. 93–102.
SCAMSCAM-2011-AvanciniC #approach #search-based #security #testing #web
Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
WCREWCRE-2011-BergerBS #android #case study #security
An Android Security Case Study with Bauhaus (BJB, MB, KS), pp. 179–183.
WCREWCRE-2011-TreudeFSS #case study #reverse engineering #security
An Exploratory Study of Software Reverse Engineering in a Security Context (CT, FMFF, MADS, MS), pp. 184–188.
PLDIPLDI-2011-LiTOKCSH #data flow #hardware #named
Caisson: a hardware description language for secure information flow (XL, MT, JO, VK, FTC, TS, BH), pp. 109–120.
PLDIPLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security #using
A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
SASSAS-2011-Mitchell #program analysis #security #web
Program Analysis for Web Security (JCM), p. 4.
STOCSTOC-2011-Ajtai
Secure computation with information leaking to an adversary (MA), pp. 715–724.
STOCSTOC-2011-Pass #security #standard
Limits of provable security from standard assumptions (RP), pp. 109–118.
ICALPICALP-v2-2011-LibertY #adaptation
Adaptively Secure Non-interactive Threshold Cryptosystems (BL, MY), pp. 588–600.
SFMSFM-2011-CostaIMMS #security #trust
Security and Trust (GC, VI, FM, IM, RS), pp. 393–416.
SFMSFM-2011-JurjensOSMHI #evolution #modelling #specification
Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (JJ, MO, HS, LM, SHH, SI), pp. 504–526.
ICFPICFP-2011-SwamyCFSBY #dependent type #distributed #programming
Secure distributed programming with value-dependent types (NS, JC, CF, PYS, KB, JY), pp. 266–278.
CHICHI-2011-AyyavuJ #feedback #heuristic #privacy #security
Integrating user feedback with heuristic security and privacy management systems (PA, CJ), pp. 2305–2314.
CHICHI-2011-HayashiHC #authentication #security #visual notation
Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes (EH, JIH, NC), pp. 2055–2064.
CHICHI-2011-LucaFMSHKH #internet #security #visualisation
Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool (ADL, BF, MEM, JS, DH, NK, HH), pp. 887–890.
CHICHI-2011-MathiasenB #design #interactive #security
Experiencing security in interaction design (NRM, SB), pp. 2325–2334.
HCIHCD-2011-Yamane #authentication #case study #design #game studies #multi #online
Secure Online Game Play with Token: A Case Study in the Design of Multi-factor Authentication Device (SRY), pp. 597–605.
HCIHIMI-v1-2011-JeonKLW #analysis #security #smarttech
A Practical Analysis of Smartphone Security (WJ, JK, YL, DW), pp. 311–320.
HCIHIMI-v1-2011-Pavel11a #approach #composition #design #protocol #security
An Approach for Security Protocol Design Based on Zero-Knowledge Primitives Composition (OP), pp. 374–378.
CAiSECAiSE-2011-SchmidtJ #analysis #design #requirements #security #using
Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
ICEISICEIS-v1-2011-WeiY #analysis #behaviour #game studies #metric #security
Security Investment Analysis on Gaming Theory with Measurements of Cost and Decision Behavior (WW, RY), pp. 519–523.
ICEISICEIS-v2-2011-DingL #database #design #security
Based on “Scenarios-response” Model of Security Plans for Emergency Management System of Database Design (DD, XL), pp. 210–212.
ICEISICEIS-v3-2011-JiangZC #case study #security
Study on the Information Security System for Bank in China (XJ, ZZ, FC), pp. 190–195.
ICEISICEIS-v3-2011-ShenYZT #analysis #documentation #security
Analysis of Core Documents in Information Security Based on Mapping Knowledge Domains (HZS, QJY, QJZ, LyT), pp. 421–427.
ICEISICEIS-v4-2011-ShailaVPTVP #named #network
KCSR: Keymatches Constrained Secure Routing in Heterogeneous Wireless Sensor Networks (KS, GHV, CRP, VT, KRV, LMP), pp. 13–22.
KDDKDD-2011-GundechaBL #network #privacy #social
Exploiting vulnerability to secure user privacy on a social networking site (PG, GB, HL), pp. 511–519.
KDDKDD-2011-McCue #security
Operational security analytics: doing more with less (CM), p. 782.
KEODKEOD-2011-BoinskiOSK #integration #ontology #security
Security Ontology Construction and Integration (TB, PO, JS, HK), pp. 369–374.
KMISKMIS-2011-SchwittekSEH #towards
Towards a Common Body of Knowledge for Engineering Secure Software and Services (WS, HS, SE, MH), pp. 369–374.
SEKESEKE-2011-SanfordWX #analysis #modelling #security #using
Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
SEKESEKE-2011-WagnerFF #process #security #using
Using Security Patterns to Tailor Software Process (RW, LMF, ABF), pp. 672–677.
ECMFAECMFA-2011-JurjensMOS #evolution #incremental #modelling #security #verification
Incremental Security Verification for Evolving UMLsec models (JJ, LM, MO, HS), pp. 52–68.
OOPSLAOOPSLA-2011-SonMS #named #security #what
RoleCast: finding missing security checks when you do not know what checks are (SS, KSM, VS), pp. 1069–1084.
PPDPPPDP-2011-BourdierC #analysis #network #policy #security #term rewriting #using
Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
RERE-2011-FailyF #elicitation #requirements #security
Eliciting usable security requirements with misusability cases (SF, IF), pp. 339–340.
RERE-2011-FranqueiraTYWN #security
Risk and argument: A risk-based argumentation method for practical security (VNLF, TTT, YY, RW, BN), pp. 239–248.
RERE-2011-YuTTFN #named
OpenArgue: Supporting argumentation to evolve secure software systems (YY, TTT, AT, VNLF, BN), pp. 351–352.
REFSQREFSQ-2011-KnaussHSIJ #requirements #security
Supporting Requirements Engineers in Recognising Security Issues (EK, SHH, KS, SI, JJ), pp. 4–18.
SACSAC-2011-AdaikkalavanP #query
Secure shared continuous query processing (RA, TP), pp. 1000–1005.
SACSAC-2011-Blech #encryption #logic #proving #security
Proving the security of ElGamal encryption via indistinguishability logic (JOB), pp. 1625–1632.
SACSAC-2011-SohrMN #aspect-oriented #mobile #security
Software security aspects of Java-based mobile phones (KS, TM, AN), pp. 1494–1501.
SACSAC-2011-WoodraskaSX #mutation testing #security #testing
Security mutation testing of the FileZilla FTP server (DW, MS, DX), pp. 1425–1430.
SACSAC-2011-ZhuYXLYGQLCG #monitoring #named #security
VASP: virtualization assisted security monitor for cross-platform protection (MZ, MY, MX, BL, PY, SG, ZQ, LL, YC, HG), pp. 554–559.
ICSEICSE-2011-Davies #reuse #security
Measuring subversions: security and legal risk in reused software artifacts (JD), pp. 1149–1151.
ICSEICSE-2011-Jurjens #automation #evolution #modelling #security #uml
Automated security hardening for evolving UML models (JJ), pp. 986–988.
ICSEICSE-2011-Smith #functional #requirements #security #testing #using
Systematizing security test case planning using functional requirements phrases (BS), pp. 1136–1137.
HPCAHPCA-2011-QureshiSLF #detection #online
Practical and secure PCM systems by online detection of malicious write streams (MKQ, AS, LL, MF), pp. 478–489.
SOSPSOSP-2011-ColpNZACDLW #security
Breaking up is hard to do: security and functionality in a commodity hypervisor (PC, MN, JZ, WA, GC, TD, PL, AW), pp. 189–202.
SOSPSOSP-2011-ZhouFNHLS #network
Secure network provenance (WZ, QF, AN, AH, BTL, MS), pp. 295–310.
CADECADE-2011-AlbertiAR #analysis #automation #named #policy #security
ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
CADECADE-2011-ArnaudCD #protocol #recursion #security #testing
Deciding Security for Protocols with Recursive Tests (MA, VC, SD), pp. 49–63.
ICSTICST-2011-DadeauHK #generative #protocol #security #testing
Mutation-Based Test Generation from Security Protocols in HLPSL (FD, PCH, RK), pp. 240–248.
ICSTICST-2011-LetarteGM #evolution #php #security #web
Security Model Evolution of PHP Web Applications (DL, FG, EM), pp. 289–298.
ICSTICST-2011-Zech #in the cloud #security #testing
Risk-Based Security Testing in Cloud Computing Environments (PZ), pp. 411–414.
TAPTAP-2011-BuchlerOP #security #testing
Security Mutants for Property-Based Testing (MB, JO, AP), pp. 69–77.
ASEASE-2010-Abi-AntounB #architecture #security
Analyzing security architectures (MAA, JMB), pp. 3–12.
ASEASE-2010-MorinMFTBJ #adaptation #modelling
Security-driven model-based dynamic adaptation (BM, TM, FF, YLT, OB, JMJ), pp. 205–214.
DACDAC-2010-WeiMP #hardware #security
Gate-level characterization: foundations and hardware security applications (SW, SM, MP), pp. 222–227.
DATEDATE-2010-Barker #aspect-oriented #network #security
Security aspects in 6lowPan networks (RB), p. 660.
DocEngDocEng-2010-SimskeSAE #documentation #ecosystem #forensics #security
Document imaging security and forensics ecosystem considerations (SJS, MS, GBA, PE), pp. 41–50.
DRRDRR-2010-ChenL #on the #pseudo #security #usability
On the usability and security of pseudo-signatures (JC, DPL), pp. 1–10.
SIGMODSIGMOD-2010-MarczakHBSLA #distributed #named
SecureBlox: customizable secure distributed data processing (WRM, SSH, MB, MS, BTL, MA), pp. 723–734.
VLDBVLDB-2010-AllardABGFNPRRY
Secure Personal Data Servers: a Vision Paper (TA, NA, LB, YG, LLF, BN, PP, IR, IR, SY), pp. 25–35.
ESOPESOP-2010-KingJMJJS #automation #security
Automating Security Mediation Placement (DK, SJ, DM, TJ, SJ, SAS), pp. 327–344.
FoSSaCSFoSSaCS-2010-CassezMZ #complexity #data flow #security
The Complexity of Synchronous Notions of Information Flow Security (FC, RvdM, CZ), pp. 282–296.
CSMRCSMR-2010-GarciaDFWGI #design #development #java #named #open source #reliability #web
ROMULUS: Domain Driven Design and Mashup Oriented Development Based on Open Source Java Metaframework for Pragmatic, Reliable and Secure Web Development (BG, JCD, JIFV, AW, MG, CAI), pp. 186–189.
MSRMSR-2010-GegickRX #case study #debugging #identification #industrial #mining #security
Identifying security bug reports via text mining: An industrial case study (MG, PR, TX), pp. 11–20.
MSRMSR-2010-MauczkaSFBG #mining #security
Mining security changes in FreeBSD (AM, CS, FF, MB, TG), pp. 90–93.
PLDIPLDI-2010-ChenCS #compilation #security #verification
Type-preserving compilation of end-to-end verification of security enforcement (JC, RC, NS), pp. 412–423.
ICALPICALP-v1-2010-ApplebaumIK #performance #verification
From Secrecy to Soundness: Efficient Verification via Secure Computation (BA, YI, EK), pp. 152–163.
ICALPICALP-v2-2010-ChandranGO #fault tolerance #network
Improved Fault Tolerance and Secure Computation on Sparse Networks (NC, JAG, RO), pp. 249–260.
SEFMSEFM-2010-Pavlovic #bibliography #effectiveness #perspective #security
The Unreasonable Ineffectiveness of Security Engineering: An Overview (DP), pp. 12–18.
SFMSFM-2010-MalacariaH #data flow #security
Information Theory and Security: Quantitative Information Flow (PM, JH), pp. 87–134.
SFMSFM-2010-WolterR #performance #security #trade-off
Performance and Security Tradeoff (KW, PR), pp. 135–167.
ICFPICFP-2010-MorgensternL #programming
Security-typed programming within dependently typed programming (JM, DRL), pp. 169–180.
CHICHI-2010-BianchiOK
The secure haptic keypad: a tactile password system (AB, IO, DSK), pp. 1089–1092.
CHICHI-2010-BlomVSGAA #mobile #safety #security
Fear and the city: role of mobile services in harnessing safety and security in urban use contexts (JB, DV, MS, JG, KA, RA), pp. 1841–1850.
CHICHI-2010-DenningBFGKM #security
Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices (TD, AB, BF, BTG, TK, WHM), pp. 917–926.
CHICHI-2010-LucaHH #named
ColorPIN: securing PIN entry through indirect input (ADL, KH, HH), pp. 1103–1106.
CHICHI-2010-Villamarin-SalomonB #behaviour #using
Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
ICEISICEIS-ISAS-2010-JiagueFGKLMS #functional #modelling #policy #security
Model-driven Engineering of Functional Security Policies (MEJ, MF, FG, PK, RL, JM, RSD), pp. 374–379.
CIKMCIKM-2010-BonifatiWL #distributed #named #peer-to-peer #privacy #social
SPac: a distributed, peer-to-peer, secure and privacy-aware social space (AB, WHW, RL), pp. 1953–1954.
ICPRICPR-2010-BelguechiRA
Biohashing for Securing Minutiae Template (RB, CR, SAA), pp. 1168–1171.
ICPRICPR-2010-HassanAMHW #authentication #image #self #using
Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
ICPRICPR-2010-KumarTG #symmetry
Combination of Symmetric Hash Functions for Secure Fingerprint Matching (GK, ST, VG), pp. 890–893.
ICPRICPR-2010-KunduD #image #security
Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding (MKK, SD), pp. 1457–1460.
ICPRICPR-2010-YangBGB #security
Renewable Minutiae Templates with Tunable Size and Security (BY, CB, DG, PB), pp. 878–881.
KEODKEOD-2010-TrikiBFH #design #modelling
Modeling Conflict of Interest in the Design of Secure Data Warehouses (ST, HBA, JF, NH), pp. 445–448.
KMISKMIS-2010-KadhemAK #database #encryption #order #performance #relational
A Secure and Efficient Order Preserving Encryption Scheme for Relational Databases (HK, TA, HK), pp. 25–35.
KMISKMIS-2010-MacePM #editing #ontology #security
Ontology Editing Tool for Information Security and Human Factors Experts (JCM, SEP, APAvM), pp. 207–212.
SEKESEKE-2010-BernhartAMG #automation #case study #experience #framework #integration #testing #verification
Automated Integration Testing and Verification of a Secured SOA Infrastructure — an Experience Report in eHealth (MB, TA, AM, TG), pp. 198–202.
SEKESEKE-2010-Bouabana-TebibelGM #ad hoc #protocol
Secure ad-hoc routing protocol (TBT, RNG, SM), pp. 771–776.
SEKESEKE-2010-El-Attar #analysis #case study #precise #robust #security
Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
SEKESEKE-2010-MadieshW #process #top-down
A Top-Down Method for Secure SOA-based B2B Processes (MM, GW), pp. 698–703.
SEKESEKE-2010-SeguraS #named #peer-to-peer #security
P2PSecT: Peer-to-peer Security Testbed (ES, XS), pp. 783–786.
SEKESEKE-2010-WyethZ #architecture #security #specification
Formal Specification of Software Architecture Security Tactics (AW, CZ), pp. 172–175.
POPLPOPL-2010-BhargavanFG #composition #protocol #security #type system #verification
Modular verification of security protocol code by typing (KB, CF, ADG), pp. 445–456.
REFSQREFSQ-2010-IslamMW #elicitation #framework #privacy #requirements #security #towards
Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations (SI, HM, SW), pp. 255–261.
SACSAC-2010-CappelliCGL #analysis #requirements #security
Transparency versus security: early analysis of antagonistic requirements (CC, HdSC, BGB, JCSdPL), pp. 298–305.
SACSAC-2010-ClaycombLSK #network #policy #security
A group-based security policy for wireless sensor networks (WC, RL, DS, BK), pp. 778–785.
SACSAC-2010-ClaycombS #analysis #framework #security
A framework for risk analysis in virtual directory security (WC, DS), pp. 1881–1882.
SACSAC-2010-CuzzocreaB #distributed #framework #multi #privacy #xml
A secure multiparty computation privacy preserving OLAP framework over distributed XML data (AC, EB), pp. 1666–1673.
SACSAC-2010-Fenz #generative #metric #ontology
Ontology-based generation of IT-security metrics (SF), pp. 1833–1839.
SACSAC-2010-GrossklagsRCC #named #network #security
Nudge: intermediaries’ role in interdependent network security (JG, SR, AAC, JC), pp. 1879–1880.
SACSAC-2010-HoqueRA #named #protocol #scalability #using
S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
SACSAC-2010-LombardiP #security
Transparent security for cloud (FL, RDP), pp. 414–415.
SACSAC-2010-MohamedA #ad hoc #framework #network #novel
Novel immune-based framework for securing ad hoc networks (YAM, ABA), pp. 1950–1957.
ICSEICSE-2010-DiosDSBCE #development #modelling #named #user interface
SSG: a model-based development environment for smart, security-aware GUIs (MAGdD, CD, MS, DAB, MC, ME), pp. 311–312.
ICSEICSE-2010-Firesmith #requirements #summary #tutorial
Engineering safety- and security-related requirements for software-intensive systems: tutorial summary (DGF), pp. 489–490.
ICSEICSE-2010-Staite #re-engineering
Portable secure identity management for software engineering (CS), pp. 325–326.
OSDIOSDI-2010-Chlipala #policy #security #static analysis
Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications (AC), pp. 105–118.
CAVCAV-2010-Jha #legacy #security
Retrofitting Legacy Code for Security (SJ), p. 19.
CSLCSL-2010-BasinC #protocol #security
Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
ICSTICST-2010-ZimmermannNW #predict #security
Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista (TZ, NN, LAW), pp. 421–428.
IJCARIJCAR-2010-ChevalCD #analysis #automation #constraints #equivalence #security
Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
ISSTAISSTA-2010-Romero-MarionaZR #automation #named #requirements
ASSURE: automated support for secure and usable requirements engineering (JRM, HZ, DJR), pp. 279–282.
LICSLICS-2010-Abadi #security
The Fine Print of Security (MA), p. 110.
ASEASE-2009-Romero-Mariona #requirements
Secure and Usable Requirements Engineering (JRM), pp. 703–706.
DACDAC-2009-Uchida #ubiquitous
Single-electron devices for ubiquitous and secure computing applications (KU), pp. 301–303.
DATEDATE-2009-LiRJ #architecture
An architecture for secure software defined radio (CL, AR, NKJ), pp. 448–453.
DATEDATE-2009-PatelPR #architecture #framework #named #security
CUFFS: An instruction count based architectural framework for security of MPSoCs (KP, SP, RGR), pp. 779–784.
ICDARICDAR-2009-GarainH #authentication #documentation #security
Machine Authentication of Security Documents (UG, BH), pp. 718–722.
SIGMODSIGMOD-2009-CorcoranSH #security #web
Cross-tier, label-based security enforcement for web applications (BJC, NS, MWH), pp. 269–282.
SIGMODSIGMOD-2009-NathYC #outsourcing
Secure outsourced aggregation via one-way chains (SN, HY, HC), pp. 31–44.
SIGMODSIGMOD-2009-NehmeLBR #approach #data type #named #privacy #security #towards
StreamShield: a stream-centric approach towards security and privacy in data stream environments (RVN, HSL, EB, EAR), pp. 1027–1030.
SIGMODSIGMOD-2009-WongCKM #database
Secure kNN computation on encrypted databases (WKW, DWLC, BK, NM), pp. 139–152.
VLDBVLDB-2009-MukherjeeGDMZLKASW
Oracle SecureFiles: Prepared for the Digital Deluge (NM, AG, VD, SM, WZ, SL, KK, BA, KS, SW), pp. 1501–1511.
ITiCSEITiCSE-2009-SaidGMJ #database #security
Database and database application security (HES, MAMG, ZM, LJ), pp. 90–93.
FASEFASE-2009-HermannEE #graph #inheritance #network #security
Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks (FH, HE, CE), pp. 325–339.
FASEFASE-2009-HuismanT #automaton #ml #security
A Formal Connection between Security Automata and JML Annotations (MH, AT), pp. 340–354.
CSMRCSMR-2009-NagyM #analysis #fault #security
Static Security Analysis Based on Input-Related Software Faults (CN, SM), pp. 37–46.
ICPCICPC-2009-LiuM #static analysis
Practical static analysis for inference of security-related program properties (YL, AM), pp. 50–59.
STOCSTOC-2009-LinPV #concurrent #framework #security
A unified framework for concurrent security: universal composability from stand-alone non-malleability (HL, RP, MV), pp. 179–188.
ICALPICALP-v2-2009-IbrahimKYZ #sublinear
Secure Function Collection with Sublinear Storage (MHI, AK, MY, HSZ), pp. 534–545.
FMFM-2009-McIverM #case study #composition #refinement #security
Sums and Lovers: Case Studies in Security, Compositionality and Refinement (AM, CCM), pp. 289–304.
FMFM-2009-McIverMM #probability #security
Security, Probability and Nearly Fair Coins in the Cryptographers’ Café (AM, LM, CM), pp. 41–71.
CHICHI-2009-LucaZH #authentication #named
Vibrapass: secure authentication based on shared lies (ADL, EvZ, HH), pp. 913–916.
HCIHCD-2009-KondoY #case study #security
HCD Case Study for the Information Security Training System (AK, MY), pp. 979–985.
HCIHIMI-DIE-2009-Ocenasek09a #approach #communication #design #embedded
An Approach for the Design of Secure Communication in Embedded Systems (PO), pp. 579–586.
HCIHIMI-DIE-2009-Ocenasek09b #architecture #security #towards
Towards Security Issues in ZigBee Architecture (PO), pp. 587–593.
HCIHIMI-DIE-2009-TarasewichNS #mobile #privacy #security
Exploring Employee Perspectives on Information Privacy and Security in the Mobile Environment (PT, BN, MS), pp. 171–180.
AdaEuropeAdaEurope-2009-DelangePF #architecture #requirements #safety #security #validation
Validating Safety and Security Requirements for Partitioned Architectures (JD, LP, PHF), pp. 30–43.
CAiSECAiSE-2009-MouratidisSJ #case study #experience #health #information management #lessons learnt
Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects (HM, AS, JJ), pp. 231–245.
ICEISICEIS-ISAS-2009-ArmenterosMMS #communication #dependence #prototype #security
Security and Dependability in Ambient Intelligence Scenarios — The Communication Prototype (ÁA, AM, AM, DS), pp. 49–56.
ICEISICEIS-ISAS-2009-Barjis09a #information management #modelling #process #security
Information Systems Security based on Business Process Modeling (JB), pp. 213–218.
ICEISICEIS-ISAS-2009-Peng #workflow
A BPMN based Secure Workflow Model (LP), pp. 268–272.
ICEISICEIS-ISAS-2009-SunyaevKMK #analysis #health #security
Security Analysis of the German Electronic Health Card’s Peripheral Parts (AS, AK, CM, HK), pp. 19–26.
SEKESEKE-2009-Abu-NimehMM #privacy #requirements #security
Integrating Privacy Requirements into Security Requirements Engineering (SAN, SM, NRM), pp. 542–547.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
MODELSMoDELS-2009-LloydJ #analysis #authentication #ml #security #using
Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
ECOOPECOOP-2009-DamJLP #java #monitoring #parallel #security #thread
Security Monitor Inlining for Multithreaded Java (MD, BJ, AL, FP), pp. 546–569.
PADLPADL-2009-Moura #implementation
Secure Implementation of Meta-predicates (PM), pp. 269–283.
RERE-2009-ElahiY #analysis #requirements #security #trade-off #trust
Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
RERE-2009-LongLYJ #approach #evaluation #requirements #security
AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
SACSAC-2009-AhamedKHZ #security #towards #trust
Towards developing a trust-based security solution (SIA, DK, CSH, MZ), pp. 2204–2205.
SACSAC-2009-DjalalievB #documentation #retrieval
Secure web-based retrieval of documents with usage controls (PD, JCB), pp. 2062–2069.
SACSAC-2009-HoqueRA #authentication #privacy #protocol #robust #security #using
Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
SACSAC-2009-JesiMNS #approach
Prestige-based peer sampling service: interdisciplinary approach to secure gossip (GPJ, EM, SKN, MvS), pp. 1209–1213.
SACSAC-2009-KerschbaumDSB #communication #complexity #multi #on the #protocol
On the practical importance of communication complexity for secure multi-party computation protocols (FK, DD, AS, DB), pp. 2008–2015.
SACSAC-2009-LombardiP #kernel #linux #named #security #virtual machine
KvmSec: a security extension for Linux kernel virtual machines (FL, RDP), pp. 2029–2034.
SACSAC-2009-NeedelsK #distributed #peer-to-peer
Secure routing in peer-to-peer distributed hash tables (KN, MK), pp. 54–58.
SACSAC-2009-PassitoMM #analysis #network #protocol #using
Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
SACSAC-2009-SchryenK #open source #security #towards
Open source vs. closed source software: towards measuring security (GS, RK), pp. 2016–2023.
SACSAC-2009-TangCCXHTC #network #peer-to-peer
Securing key issuing in peer-to-peer networks (CT, RC, ZC, AX, JbH, LT, ZC), pp. 84–85.
SACSAC-2009-YokoyamaHSK #internet #operating system #policy #security
Simplifying security policy descriptions for internet servers in secure operating systems (TY, MH, MS, KK), pp. 326–333.
ESEC-FSEESEC-FSE-2009-BezemerMD #automation #interactive #security #testing #web
Automated security testing of web widget interactions (CPB, AM, AvD), pp. 81–90.
SOSPSOSP-2009-LiuGVQWM #distributed #framework #named
Fabric: a platform for secure distributed computation and storage (JL, MDG, KV, XQ, LW, ACM), pp. 321–334.
SOSPSOSP-2009-YipWZK #data flow #security
Improving application security with data flow assertions (AY, XW, NZ, MFK), pp. 291–304.
CADECADE-2009-CiobacaDK #convergence #equation #protocol #security
Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
CAVCAV-2009-AbadiBC #modelling #protocol #proving #security
Models and Proofs of Protocol Security: A Progress Report (MA, BB, HCL), pp. 35–49.
ICLPICLP-2009-HildebrandtL #concurrent #constraints #pattern matching #programming
Types for Secure Pattern Matching with Local Knowledge in Universal Concurrent Constraint Programming (TTH, HAL), pp. 417–431.
ICSTICST-2009-MouelhiTB #functional #policy #security #testing
Transforming and Selecting Functional Test Cases for Security Policy Testing (TM, YLT, BB), pp. 171–180.
RTARTA-2009-BursucC #algebra #bound #protocol #security
Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
TAPTAP-2009-Chetali #certification #formal method #security #smarttech #testing
Security Testing and Formal Methods for High Levels Certification of Smart Cards (BC), pp. 1–5.
FATESTestCom-FATES-2009-MarchandDJ #automation #data access #security #testing
Automatic Testing of Access Control for Security Properties (HM, JD, TJ), pp. 113–128.
VMCAIVMCAI-2009-Cortier #protocol #security #verification
Verification of Security Protocols (VC), pp. 5–13.
ECSAECSA-2008-ChatzigiannakisLSS #security
A Security Model for Internet-Based Digital Asset Management Systems (IC, VL, DS, PGS), pp. 326–329.
ASEASE-2008-YuJS #development #tool support #traceability
Tools for Traceability in Secure Software Development (YY, JJ, JS), pp. 503–504.
DACDAC-2008-PatelP #design #hardware #named #reliability #security
SHIELD: a software hardware design methodology for security and reliability of MPSoCs (KP, SP), pp. 858–861.
DATEDATE-2008-ThoguluvaRC #architecture #performance #programmable #security #using
Efficient Software Architecture for IPSec Acceleration Using a Programmable Security Processor (JT, AR, STC), pp. 1148–1153.
DocEngDocEng-2008-GormishWPH #approach #distributed #documentation #flexibility #metadata #security
Document logs: a distributed approach to metadata for better security and flexibility (MJG, GW, KWP, PH), pp. 119–122.
VLDBVLDB-2008-MukherjeeAGKLMSWZ
Oracle SecureFiles System (NM, BA, AG, KK, SL, SM, KS, SW, WZ), pp. 1301–1312.
CSEETCSEET-2008-Epstein #agile #how #process #student
Getting Students to Think About How Agile Processes can be Made More Secure (RGE), pp. 51–58.
CSEETCSEET-2008-Epstein08a #process #re-engineering #security
A Software Engineering Course with an Emphasis on Software Processes and Security (RGE), pp. 67–73.
CSEETCSEET-2008-ShoemakerDIM #assurance #recommendation
Integrating Secure Software Assurance Content with SE2004 Recommendations (DS, AD, JAI, NRM), pp. 59–66.
ITiCSEITiCSE-2008-CatuognoS #internet #network #security
An internet role-game for the laboratory of network security course (LC, ADS), pp. 240–244.
FASEFASE-2008-JurjensSY #analysis #automation #security #using
Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
ICSMEICSM-2008-YuJM #maintenance #traceability
Traceability for the maintenance of secure software (YY, JJ, JM), pp. 297–306.
PEPMPEPM-2008-LamMLW #data flow #information management #web
Securing web applications with static and dynamic information flow tracking (MSL, MCM, VBL, JW), pp. 3–12.
STOCSTOC-2008-GordonHKL
Complete fairness in secure two-party computation (SDG, CH, JK, YL), pp. 413–422.
ICALPICALP-B-2008-Canetti #analysis #composition #performance #security
Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency (RC), pp. 1–13.
ICALPICALP-C-2008-HallgrenKSZ #protocol #quantum #verification
Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
ICALPICALP-C-2008-PrabhakaranR #encryption #security
Homomorphic Encryption with CCA Security (MP, MR), pp. 667–678.
ICALPICALP-C-2008-WehnerW #bound #composition #security
Composable Security in the Bounded-Quantum-Storage Model (SW, JW), pp. 604–615.
FMFM-2008-ChetaliN #evaluation #formal method #industrial #security
Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
FMFM-2008-GrandyBSSR #protocol #security #verification
Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code (HG, MB, KS, GS, WR), pp. 165–180.
FMFM-2008-LintelmanRLS #formal method #security
Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution (SL, RR, ML, KS), pp. 406–410.
SEFMSEFM-2008-Giacobazzi #abstract interpretation #security
Abstract Interpretation in Code Security (RG), p. 3.
ICGTICGT-2008-Grohmann #encryption #graph #security
Security, Cryptography and Directed Bigraphs (DG), pp. 487–489.
CHICHI-2008-ReederBCRBHS #authoring #policy #security #visualisation
Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
CHICHI-2008-StollTES #named #security #visualisation
Sesame: informing user security decisions with system visualization (JS, CST, WKE, KS), pp. 1045–1054.
CAiSECAiSE-2008-MatuleviciusMMDHG #adaptation #development #information management #risk management #security
Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development (RM, NM, HM, ED, PH, NG), pp. 541–555.
EDOCEDOC-2008-Quint #as a service #automation #distributed #security
SOA Security — as a Service Automatic Conversion in Distributed Infrastructures (BQ).
EDOCEDOC-2008-SommestadEJ #analysis #architecture #enterprise #graph #modelling #security
Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
ICEISICEIS-ISAS2-2008-HuberSK #analysis #framework #health #security
Security Analysis of the Health Care Telematics Infrastructure in Germany (MJH, AS, HK), pp. 144–153.
ICEISICEIS-ISAS2-2008-KiyomotoOT #automation #generative #on the fly #protocol #security
On-the-Fly Automatic Generation of Security Protocols (SK, HO, TT), pp. 97–104.
ICEISICEIS-ISAS2-2008-TobarraCPC #protocol #verification
Formal Verification of the Secure Sockets Layer Protocol (MLT, DC, JJP, FC), pp. 246–252.
ICPRICPR-2008-NagarNJ #fuzzy
Securing fingerprint template: Fuzzy vault with minutiae descriptors (AN, KN, AKJ), pp. 1–4.
SEKESEKE-2008-LiuLZL #logic #protocol #security
Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic (FL, ZL, TZ, ML), pp. 795–801.
SEKESEKE-2008-ReddyreddyX #using #xml
Securing Service-oriented Systems Using State-Based XML Firewall (AR, HX), pp. 512–518.
SEKESEKE-2008-Shaffer #domain model #security #source code #static analysis #verification
A Security Domain Model for Static Analysis and Verification of Software Programs (ABS), pp. 673–678.
SEKESEKE-2008-TekbacakTD #approach #certification #data access #security #semantics #using
A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
SEKESEKE-2008-TsigkritisS #dependence #runtime #security
Diagnosing Runtime Violations of Security & Dependability Properties (TT, GS), pp. 661–666.
ECMFAECMDA-FA-2008-ClavelSBE #experience #industrial #modelling #security
Model-Driven Security in Practice: An Industrial Experience (MC, VTdS, CB, ME), pp. 326–337.
MODELSMoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing
A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
MODELSMoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing
A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
PPDPPPDP-2008-OlarteV #monad #security
The expressivity of universal timed CCP: undecidability of Monadic FLTL and closure operators for security (CO, FDV), pp. 8–19.
POPLPOPL-2008-FournetR #data flow #encryption #implementation #security
Cryptographically sound implementations for typed information-flow security (CF, TR), pp. 323–335.
RERE-2008-CalleleNS #game studies #requirements #security #video
Balancing Security Requirements and Emotional Requirements in Video Games (DC, EN, KS), pp. 319–320.
RERE-2008-WeissM #requirements #security
Selecting Security Patterns that Fulfill Security Requirements (MW, HM), pp. 169–172.
SACSAC-2008-AhamedRH #architecture #distributed #identification #scalability #using
Secured tag identification using EDSA (enhanced distributed scalable architecture) (SIA, FR, MEH), pp. 1902–1907.
SACSAC-2008-AkhterK
Building secure e-business systems: technology and culture in the UAE (FA, LK), pp. 1474–1475.
SACSAC-2008-BracherK #documentation #implementation #prototype
Implementing secure document circulation: a prototype (SB, PK), pp. 1452–1456.
SACSAC-2008-CamilleriBC #composition
Securing aspect composition (AC, LB, GC), pp. 278–279.
SACSAC-2008-DelessyF #process #security
A pattern-driven security process for SOA applications (NAD, EBF), pp. 2226–2227.
SACSAC-2008-GarciaT #security #semantics #using #web #web service
Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
SACSAC-2008-LeeHCHS #file system
Secure deletion for NAND flash file system (JL, JH, YC, JH, SYS), pp. 1710–1714.
SACSAC-2008-OlarteV #concurrent #constraints #security #semantics
Universal concurrent constraint programing: symbolic semantics and applications to security (CO, FDV), pp. 145–150.
SACSAC-2008-ZhangNLH #approach #enterprise #modelling #network #security
A model-based semi-quantitative approach for evaluating security of enterprise networks (ZZ, FNA, XL, PHH), pp. 1069–1074.
ICSEICSE-2008-JurjensSB #analysis #mobile #modelling #security
Model-based security analysis for mobile communications (JJ, JS, PB), pp. 683–692.
ICSEICSE-2008-WhittleWH #case study #execution #modelling #security
Executable misuse cases for modeling security concerns (JW, DW, MH), pp. 121–130.
ICSEICSE-2008-XiaoLG #distributed #protocol #security
Developing a security protocol for a distributed decision support system in a healthcare environment (LX, PHL, AG), pp. 673–682.
ASPLOSASPLOS-2008-LvinNBZ #named #reliability #security
Archipelago: trading address space for reliability and security (VBL, GN, EDB, BGZ), pp. 115–124.
ASPLOSASPLOS-2008-NightingalePCF #hardware #security
Parallelizing security checks on commodity hardware (EBN, DP, PMC, JF), pp. 308–318.
HPDCHPDC-2008-SmithSF #grid
Securing stateful grid servers through virtual server rotation (MS, CS, BF), pp. 11–22.
OSDIOSDI-2008-ZeldovichKDK #hardware #memory management #policy #security #using
Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
CAVCAV-2008-BackesLMP #abstraction #analysis #protocol #security
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
CAVCAV-2008-Cremers #analysis #protocol #security #verification
The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
ICLPICLP-2008-Beauxis #concurrent #modelling #probability #security
Probabilistic and Concurrent Models for Security (RB), pp. 801–802.
ICLPICLP-2008-BonattiCOS #privacy #security #trust
Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
ICLPICLP-2008-Tsitovich #detection #model checking #security #using
Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
IJCARIJCAR-2008-Comon-Lundh #automation #challenge #protocol #security #verification
Challenges in the Automated Verification of Security Protocols (HCL), pp. 396–409.
IJCARIJCAR-2008-KremerMT #protocol #proving
Proving Group Protocols Secure Against Eavesdroppers (SK, AM, RT), pp. 116–131.
ISSTAISSTA-2008-BalzarottiBCFKRVV #security #testing
Are your votes really counted?: testing the security of real-world electronic voting systems (DB, GB, MC, VF, RAK, WKR, FV, GV), pp. 237–248.
MBTMBT-2008-Jurjens #case study #modelling #security #testing #using
Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
FATESTestCom-FATES-2008-ShuCLLSL #framework #named #network #paradigm #security #testing
VCSTC: Virtual Cyber Security Testing Capability — An Application Oriented Paradigm for Network Infrastructure Protection (GS, DC, ZL, NL, LS, DL), pp. 119–134.
VMCAIVMCAI-2008-Pistoia #program analysis #programming language #security
Program Analysis and Programming Languages for Security (MP), p. 7.
ASEASE-2007-Abi-AntounWT #consistency #data flow #diagrams #implementation #modelling #security
Checking threat modeling data flow diagrams for implementation conformance and security (MAA, DW, PT), pp. 393–396.
ASEASE-2007-JurjensY #modelling #security #tool support
Tools for model-based security engineering: models vs. code (JJ, YY), pp. 545–546.
CASECASE-2007-FagioliniVPDB #detection #distributed #implementation #monitoring #multi
Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems (AF, GV, LP, GD, AB), pp. 454–459.
DACDAC-2007-KoushanfarP #encryption #security
CAD-based Security, Cryptography, and Digital Rights Management (FK, MP), pp. 268–269.
DACDAC-2007-MaoW #embedded #hardware
Hardware Support for Secure Processing in Embedded Systems (SM, TW), pp. 483–488.
DATEDATE-2007-NarayananKB #clustering #performance
Performance aware secure code partitioning (SHKN, MTK, RRB), pp. 1122–1127.
DATEDATE-2007-VerbauwhedeS #design #security #trust
Design methods for security and trust (IV, PS), pp. 672–677.
VLDBVLDB-2007-GeZ #query
Answering Aggregation Queries in a Secure System Model (TG, SBZ), pp. 519–530.
VLDBVLDB-2007-Sion #outsourcing
Secure Data Outsourcing (RS), pp. 1431–1432.
VLDBVLDB-2007-WongCHKM #mining #outsourcing #security
Security in Outsourcing of Association Rule Mining (WKW, DWC, EH, BK, NM), pp. 111–122.
ITiCSEITiCSE-2007-Ghafarian #assurance #security
Ideas for projects in undergraduate information assurance and security courses (AG), p. 322.
ESOPESOP-2007-MantelR #classification #security #what
Controlling the What and Where of Declassification in Language-Based Security (HM, AR), pp. 141–156.
TACASTACAS-2007-CortierKS #analysis #automation #security
Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
STOCSTOC-2007-IshaiKOS #multi
Zero-knowledge from secure multiparty computation (YI, EK, RO, AS), pp. 21–30.
STOCSTOC-2007-Katz #multi #on the
On achieving the “best of both worlds” in secure multiparty computation (JK), pp. 11–20.
ICALPICALP-2007-KiayiasZ #adaptation #composition #security
Trading Static for Adaptive Security in Universally Composable Zero-Knowledge (AK, HSZ), pp. 316–327.
IFMIFM-2007-BraghinSB #automation #mobile #policy #security #verification
Automated Verification of Security Policies in Mobile Code (CB, NS, KBA), pp. 37–53.
SEFMSEFM-2007-GrandyBSR #encoding #named #protocol #security
ASN1-light: A Verified Message Encoding for Security Protocols (HG, RB, KS, WR), pp. 195–204.
SEFMSEFM-2007-SalehD #approach #novel #security #verification
Verifying Security Properties of Cryptoprotocols: A Novel Approach (MS, MD), pp. 349–360.
CHICHI-2007-SinghCDAF #design #security #social
Password sharing: implications for security design based on social practice (SS, AC, CD, GA, MF), pp. 895–904.
HCIHCI-AS-2007-HuangRS #bibliography #people #security
A Survey of Factors Influencing People’s Perception of Information Security (DLH, PLPR, GS), pp. 906–915.
HCIHCI-AS-2007-ZouDDQ #dependence #information management #security
Dependability and Security in Medical Information System (XZ, YSD, BND, MQ), pp. 549–558.
HCIHCI-IDU-2007-EktareY #security
The Balancing Act Between Computer Security and Convenience (ME, YY), pp. 731–735.
HCIHCI-IPT-2007-ChoiY #multi #named #network
MKPS: A Multi-level Key Pre-distribution Scheme for Secure Wireless Sensor Networks (SJC, HYY), pp. 808–817.
HCIHCI-IPT-2007-HuangT #scalability #security #smarttech
A Wearable Computing Environment for the Security of a Large-Scale Factory (JyH, CHT), pp. 1113–1122.
HCIHCI-MIE-2007-CulenR #design #personalisation #privacy #security
Designing Personalized Media Center with Focus on Ethical Issues of Privacy and Security (ALC, YR), pp. 829–835.
HCIOCSC-2007-MaAL #authentication #protocol
Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
AdaSIGAda-2007-Chapman #named #security
MF1: security by construction (RC), pp. 5–6.
EDOCEDOC-2007-ChenAQH #network #security #self
Self-Configuration of Network Security (HC, YBAN, GQ, SH), pp. 97–110.
EDOCEDOC-2007-LiningtonL #approach #behaviour #modelling #security #using
Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
EDOCEDOC-2007-MohammadCWWS #architecture #multi #quality #security
A Multi-Layer Security Enabled Quality of Service (QoS) Management Architecture (AM, AC, GW, CW, RAS), pp. 423–434.
ICEISICEIS-DISI-2007-BarkerD #algebra #information management #policy
Secure knowledge exchange by policy algebra and erml (SB, PD), pp. 212–217.
ICEISICEIS-EIS-2007-Egyhazy #architecture #comparison #design #security
Comparison of Five Architecture Description Languages on Design Focus, Security and Style (CJE), pp. 270–277.
ICEISICEIS-EIS-2007-EnstromWH #assurance #enterprise #security
A Reference Model for Enterprise Security — High Assurance Enterprise Security (DWE, DW, SH), pp. 355–364.
ICEISICEIS-EIS-2007-FosterLHS #security
A Change Strategy for Organisational Security: The Role of Critical Success Factors (SF, KL, PH, AS), pp. 375–380.
ICEISICEIS-EIS-2007-KukhunS #enterprise #information management #pervasive #security
Interoperability in Pervasive Enterprise Information Systems — A Double-Faced Coin Between Security And Accessability (DAK, FS), pp. 237–242.
ICEISICEIS-EIS-2007-MehrS #modelling #security #uml
Modelling of Message Security Concerns with UML (FM, US), pp. 365–374.
KDDKDD-2007-FastFMTJGK #detection #preprocessor #relational
Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
SEKESEKE-2007-OladimejiSC #approach #architecture #modelling
A Model-driven Approach to Architecting Secure Software (EAO, SS, LC), p. 535–?.
SEKESEKE-2007-ShiN #component #java #named #security #static analysis
SAFES: A Static Analysis for Field Security in Java Components (AS, GN), pp. 302–307.
MODELSMoDELS-2007-BasinCDE #approach #metamodelling #modelling
A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
MODELSMoDELS-2007-BasinCDE #approach #metamodelling #modelling
A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
LOPSTRLOPSTR-2007-BossiPR #algebra #process #refinement #security
Action Refinement in Process Algebra and Security Issues (AB, CP, SR), pp. 201–217.
POPLPOPL-2007-BugliesiG #abstraction #implementation
Secure implementations of typed channel abstractions (MB, MG), pp. 251–262.
POPLPOPL-2007-Malacaria #security
Assessing security threats of looping constructs (PM), pp. 225–235.
POPLPOPL-2007-YuCIS #javascript #security
JavaScript instrumentation for browser security (DY, AC, NI, IS), pp. 237–249.
RERE-2007-AsnarGBMR #approach #empirical
Secure and Dependable Patterns in Organizations: An Empirical Approach (YA, PG, RB, VM, CR), pp. 287–292.
REFSQREFSQ-2007-DarimontL #requirements #security #uml
Security Requirements for Civil Aviation with UML and Goal Orientation (RD, ML), pp. 292–299.
SACSAC-2007-ClaycombS #collaboration #pervasive #resource management #towards
Towards secure resource sharing for impromptu collaboration in pervasive computing (WC, DS), pp. 940–946.
SACSAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
SACSAC-2007-MorimotoSGC #security #specification #verification
Formal verification of security specifications with common criteria (SM, SS, YG, JC), pp. 1506–1512.
SACSAC-2007-NoordendeBT #mobile #security #using
Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
SACSAC-2007-OrlovskyR #distributed #policy #security
Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
SACSAC-2007-SpanoudakisKA #monitoring #security #towards
Towards security monitoring patterns (GS, CK, KA), pp. 1518–1525.
SACSAC-2007-TopkaraAT #multi #word
Passwords decay, words endure: secure and re-usable multiple password mnemonics (UT, MJA, MT), pp. 292–299.
SACSAC-2007-YaoKBT #distributed #security #web
Decentralized authorization and data security in web content delivery (DY, YK, EB, RT), pp. 1654–1661.
ESEC-FSEESEC-FSE-2007-Hanna #implementation #lightweight #named #network #protocol #security #verification
SLEDE: lightweight verification of sensor network security protocol implementations (YH), pp. 591–594.
ICSEICSE-2007-BestJN #distributed #information management #modelling #security #using
Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
ICSEICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
ICSEICSE-2007-PistoiaFFY #enterprise #modelling #policy #security #validation
When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
ICSEICSE-2007-RubinM #education #re-engineering #security
Creating a Computer Security Curriculum in a Software Engineering Program (BSR, BSM), pp. 732–735.
ICSEICSE-2007-SkogsrudBCT #protocol #security
Managing Impacts of Security Protocol Changes in Service-Oriented Applications (HS, BB, FC, FT), pp. 468–477.
HPDCHPDC-2007-DemchenkoSGLGK #security
Security and dynamics in customer controlled virtual workspace organisation (YD, FS, LG, CTAMdL, DLG, OK), pp. 231–232.
SOSPSOSP-2007-ChongLMQVZZ #automation #clustering #web
Secure web application via automatic partitioning (SC, JL, ACM, XQ, KV, LZ, XZ), pp. 31–44.
SOSPSOSP-2007-CostaCZZP #named
Bouncer: securing software by blocking bad input (MC, MC, LZ, LZ, MP), pp. 117–130.
SOSPSOSP-2007-CriswellLDA #architecture #execution #operating system
Secure virtual architecture: a safe execution environment for commodity operating systems (JC, AL, DD, VSA), pp. 351–366.
AMOSTAMOST-2007-MassonJPJD #automation #generative #modelling #security #testing
Automatic generation of model based tests for a class of security properties (PAM, JJ, JCP, EJ, GD), pp. 12–22.
ICSTSAT-2007-DeKV #using
Inversion Attacks on Secure Hash Functions Using satSolvers (DD, AK, RV), pp. 377–382.
ASEASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving #using
Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
CASECASE-2006-Tan #automation #security
Automatic Interpretation of Human and Vehicle Motion for Enhanced Security (TT), p. 2.
DACDAC-2006-AroraRRSJC #architecture #mobile #multi #security
Software architecture exploration for high-performance security processing on a multiprocessor mobile SoC (DA, AR, SR, MS, NKJ, STC), pp. 496–501.
DACDAC-2006-InoueIKSE #architecture #mobile #named
VIRTUS: a new processor virtualization architecture for security-oriented next-generation mobile terminals (HI, AI, MK, JS, ME), pp. 484–489.
DACDAC-2006-RagelP #monitoring #named #reliability #security
IMPRES: integrated monitoring for processor reliability and security (RGR, SP), pp. 502–505.
DACDAC-2006-WangLLYHWH #design #framework #network #security
A network security processor design based on an integrated SOC design and test platform (CHW, CYL, MSL, JCY, CTH, CWW, SYH), pp. 490–495.
DATEDATE-2006-HelyBFR #design
A secure scan design methodology (DH, FB, MLF, BR), pp. 1177–1178.
DATEDATE-DF-2006-AkselrodAA #architecture #debugging #framework #independence #multi #security
Platform independent debug port controller architecture with security protection for multi-processor system-on-chip ICs (DA, AA, YA), pp. 30–35.
SIGMODSIGMOD-2006-ManjhiAMMOT #data-driven #scalability #security #web
Simultaneous scalability and security for data-intensive web applications (AM, AA, BMM, TCM, CO, AT), pp. 241–252.
VLDBVLDB-2006-FanGJK #named #xml
SMOQE: A System for Providing Secure Access to XML (WF, FG, XJ, AK), pp. 1227–1230.
VLDBVLDB-2006-WangL #database #evaluation #performance #query #xml
Efficient Secure Query Evaluation over Encrypted XML Databases (WHW, LVSL), pp. 127–138.
CSEETCSEET-2006-MeadH #case study #education #re-engineering #requirements #security
Security Requirements Engineering for Software Systems: Case Studies in Support of Software Engineering Education (NRM, EDH), pp. 149–158.
CSEETCSEET-2006-Redwine #education #re-engineering
Workshop on Secure Software Engineering Education & Training (WSSEET 2006) (STRJ), p. 245.
FoSSaCSFoSSaCS-2006-BackesMPV #analysis #encryption
Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (MB, SM, BP, LV), pp. 428–445.
WCREWCRE-2006-MoonenM #security
Code Based Software Security Assessments (LM, SM), p. 313.
STOCSTOC-2006-IshaiKLP #black box
Black-box constructions for secure computation (YI, EK, YL, EP), pp. 99–108.
STOCSTOC-2006-KushilevitzLR #composition #protocol #security
Information-theoretically secure protocols and security under composition (EK, YL, TR), pp. 109–118.
ICALPICALP-v2-2006-HarnikN #bound #hybrid #on the #security
On Everlasting Security in the Hybrid Bounded Storage Model (DH, MN), pp. 192–203.
ICALPICALP-v2-2006-WikstromG #adaptation
An Adaptively Secure Mix-Net Without Erasures (DW, JG), pp. 276–287.
FMFM-2006-DelahayeED #security #using
Certifying Airport Security Regulations Using the Focal Environment (DD, JFÉ, VDG), pp. 48–63.
FMFM-2006-Johnson #effectiveness #re-engineering #security
Cost Effective Software Engineering for Security (DRJ), pp. 607–611.
FMFM-2006-Jurjens #modelling #security
Model-Based Security Engineering for Real (JJ), pp. 600–606.
FMFM-2006-Oheimb #formal method #security
Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche (DvO), pp. 592–597.
FMFM-2006-Pavlovic #development #protocol
Connector-Based Software Development: Deriving Secure Protocols (DP), pp. 598–599.
FMFM-2006-Stephan #formal method #lightweight #plugin #security
Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline (WS), pp. 587–591.
CHICHI-2006-WuMG #question #security
Do security toolbars actually prevent phishing attacks? (MW, RCM, SLG), pp. 601–610.
AdaEuropeAdaEurope-2006-NarayananKBK #execution
Secure Execution of Computations in Untrusted Hosts (SHKN, MTK, RRB, IK), pp. 106–118.
CAiSECAiSE-2006-BrylMMZ #design #modelling #requirements #security
Designing Security Requirements Models Through Planning (VB, FM, JM, NZ), pp. 33–47.
CAiSECAiSE-2006-MouratidisJF #development #framework #towards
Towards a Comprehensive Framework for Secure Systems Development (HM, JJ, JF), pp. 48–62.
CAiSECAiSE-2006-YangNLC #approach #outsourcing #performance #query #xml
An Efficient Approach to Support Querying Secure Outsourced XML Information (YY, WN, HLL, JC), pp. 157–171.
EDOCEDOC-2006-AndersonR #enterprise #security
Information Security Guidance for Enterprise Transformation (JAA, VR), pp. 459–462.
EDOCEDOC-2006-KunduB #using #xml
Secure Dissemination of XML Content Using Structure-based Routing (AK, EB), pp. 153–164.
EDOCEDOC-2006-TangCLZY #evaluation #performance #security #web #web service
A Performance Evaluation of Web Services Security (KT, SC, DL, JZ, BY), pp. 67–74.
EDOCEDOC-2006-WangCL #enterprise #persistent #security
Anonymity and Security Support for Persistent Enterprise Conversation (CW, DKWC, HfL), pp. 471–476.
EDOCEDOC-2006-WangensteenLJD #authentication #enterprise
Secured enterprise access with strong SIM authentication (AW, LL, IJ, TvD), pp. 463–466.
ICEISICEIS-ISAS-2006-BenferhatB #policy #security
Argument-Based Approaches in Prioritized Conflicting Security Policies (SB, REB), pp. 349–354.
ICEISICEIS-ISAS-2006-Sucurovic #health #implementation #information management #named #web
MEDIS — A Web Based Health Information System — Implementing Integrated Secure Electronic Health Record (SS), pp. 160–164.
ICEISICEIS-SAIC-2006-MaamarMB #approach #web #web service
A Policy-Based Approach to Secure Context in a Web Services Environment (ZM, GKM, DB), pp. 100–105.
CIKMCIKM-2006-BaileyHM #documentation #enterprise #implementation #performance #security #trade-off
Secure search in enterprise webs: tradeoffs in efficient implementation for document level security (PB, DH, BM), pp. 493–502.
CIKMCIKM-2006-Kielman #realtime #security
The real-time nature and value of homeland security information (JK), p. 3.
ICPRICPR-v4-2006-XieZH #security
NDFT-based Audio Watermarking Scheme with High Security (LX, JZ, HH), pp. 270–273.
SEKESEKE-2006-ManaSSM #towards
Towards Secure Ambient Intelligence Scenarios (AM, FSC, DS, AM), pp. 386–391.
SEKESEKE-2006-Merz #approach #java #security #using
Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects (MM), pp. 404–409.
SEKESEKE-2006-PauliX #case study #composition #consistency
Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems (JJP, DX), pp. 392–397.
SEKESEKE-2006-PilskalnsA #design #ocl #security #testing #uml #using
Using UML Designs to Generate OCL for Security Testing (OP, AAA), pp. 505–510.
MODELSMoDELS-2006-BruckerDW #analysis #model transformation #semantics
A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
MODELSMoDELS-2006-HafnerAB #architecture #modelling #qvt #security #towards
Towards a MOF/QVT-Based Domain Architecture for Model Driven Security (MH, MA, RB), pp. 275–290.
MODELSMoDELS-2006-BruckerDW #analysis #model transformation #semantics
A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
MODELSMoDELS-2006-HafnerAB #architecture #modelling #qvt #security #towards
Towards a MOF/QVT-Based Domain Architecture for Model Driven Security (MH, MA, RB), pp. 275–290.
QAPLQAPL-2005-LanotteMT06 #classification #probability #security
A Classification of Time and/or Probability Dependent Security Properties (RL, AMS, AT), pp. 177–193.
LOPSTRLOPSTR-2006-MantelSK #data flow #proving #security #verification
Combining Different Proof Techniques for Verifying Information Flow Security (HM, HS, TK), pp. 94–110.
QAPLQAPL-2006-AdaoMRV #analysis #protocol #security #towards
Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
POPLPOPL-2006-HuntS #on the #security
On flow-sensitive security types (SH, DS), pp. 79–90.
SACSAC-2006-CreeseGRX #ad hoc #multi #security
Bootstrapping multi-party ad-hoc security (SC, MG, BR, MX), pp. 369–375.
SACSAC-2006-HeatherS #analysis #infinity #protocol #security
To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
SACSAC-2006-MorimotoSGC #security #specification #standard #verification
A security specification verification technique based on the international standard ISO/IEC 15408 (SM, SS, YG, JC), pp. 1802–1803.
SACSAC-2006-WelchL #policy #security
Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
ICSEICSE-2006-BruschiWM #re-engineering
Software engineering for secure systems (DB, BDW, MM), pp. 1007–1008.
ICSEICSE-2006-JurjensF #modelling #security #tool support
Tools for model-based security engineering (JJ, JF), pp. 819–822.
SPLCSPL-BOOK-2006-ArciniegasDRCBO #architecture #evolution #product line #reasoning #security
Architecture Reasoning for Supporting Product Line Evolution: An Example on Security (JLA, JCD, JLR, RC, JBM, MO), pp. 327–372.
SPLCSPL-BOOK-2006-FaegriH #architecture #product line #security
A Software Product Line Reference Architecture for Security (TEF, SOH), pp. 275–326.
CGOCGO-2006-ZhangZP #compilation #optimisation #security
Compiler Optimizations to Reduce Security Overhead (TZ, XZ, SP), pp. 346–357.
HPCAHPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security
InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
OSDIOSDI-2006-CastroCH #data flow
Securing Software by Enforcing Data-flow Integrity (MC, MC, TLH), pp. 147–160.
FATESFATES-RV-2006-FalconeFMR #calculus #framework #network #policy #security
A Test Calculus Framework Applied to Network Security Policies (YF, JCF, LM, JLR), pp. 55–69.
ICLPICLP-2006-LopezPPRV #concurrent #constraints #declarative #framework #programming #security
A Declarative Framework for Security: Secure Concurrent Constraint Programming (HAL, CP, JAP, CR, FDV), pp. 449–450.
LICSLICS-2006-Gordon #implementation #protocol #security
Provable Implementations of Security Protocols (ADG), pp. 345–346.
ICTSSTestCom-2006-DarmaillacqFGMR #generative #network #security #testing
Test Generation for Network Security Rules (VD, JCF, RG, LM, JLR), pp. 341–356.
ICTSSTestCom-2006-ShuL #monitoring #protocol #security #testing
Message Confidentiality Testing of Security Protocols — Passive Monitoring and Active Checking (GS, DL), pp. 357–372.
ASEASE-2005-Dolstra #deployment
Secure sharing between untrusted users in a transparent source/binary deployment model (ED), pp. 154–163.
ASEASE-2005-JurjensY #analysis #security
Code security analysis with assertions (JJ, MY), pp. 392–395.
ASEASE-2005-XuN #approach #modelling #verification
A threat-driven approach to modeling and verifying secure software (DX, KEN), pp. 342–346.
CASECASE-2005-HungHWCLH #collaboration #framework
A secure collaborative e-diagnostics framework for semiconductor factories (MHH, FYH, TLW, FTC, RL, TH), pp. 185–190.
DACDAC-2005-ChoM #network #pattern matching #security
A pattern matching coprocessor for network security (YHC, WHMS), pp. 234–239.
DACDAC-2005-YangWK #architecture
Secure scan: a design-for-test architecture for crypto chips (BY, KW, RK), pp. 135–140.
DATEDATE-2005-AroraRRJ #embedded #monitoring #runtime
Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring (DA, SR, AR, NKJ), pp. 178–183.
DATEDATE-2005-FaroukS #algorithm #communication #encryption #hybrid #implementation #security
An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security (HAF, MS), pp. 76–81.
DATEDATE-2005-TiriV05a #design
A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs (KT, IV), pp. 58–63.
PODSPODS-2005-AbadiW #analysis #documentation #encryption #security #xml
Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
ITiCSEITiCSE-2005-TobinW #education #security #using
Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
ESOPESOP-2005-CortierW #automation #protocol #proving #security
Computationally Sound, Automated Proofs for Security Protocols (VC, BW), pp. 157–171.
ESOPESOP-2005-Myers #policy #programming #security
Programming with Explicit Security Policies (ACM), pp. 1–4.
ESOPESOP-2005-TseZ #classification #design
A Design for a Security-Typed Language with Certificate-Based Declassification (ST, SZ), pp. 279–294.
FASEFASE-2005-JurjensS #analysis #development #security #tool support #uml
Tools for Secure Systems Development with UML: Security Analysis with ATPs (JJ, PS), pp. 305–309.
FASEFASE-2005-Mostowski #formal method #java #logic #security #verification
Formalisation and Verification of Java Card Security Properties in Dynamic Logic (WM), pp. 357–371.
FoSSaCSFoSSaCS-2005-FocardiRS #calculus #process #security
Bridging Language-Based and Process Calculi Security (RF, SR, AS), pp. 299–315.
ICSMEICSM-2005-Jurjens #comprehension #implementation #security
Understanding Security Goals Provided by Crypto-Protocol Implementations (JJ), pp. 643–646.
IWPCIWPC-2005-HogganvikS #comprehension #on the #security
On the Comprehension of Security Risk Scenarios (IH, KS), pp. 115–124.
PASTEPASTE-2005-Myers #distributed #program analysis #program transformation
Making distributed systems secure with program analysis and transformation (ACM), p. 47.
WCREWCRE-2005-WangCD #security #using
Enhancing Security Using Legality Assertions (LW, JRC, TRD), pp. 35–44.
PLDIPLDI-2005-BauerLW #policy #security
Composing security policies with polymer (LB, JL, DW), pp. 305–314.
SASSAS-2005-Gordon #calculus #process #security
From Typed Process Calculi to Source-Based Security (ADG), p. 2.
SASSAS-2005-TerauchiA #data flow #problem #safety
Secure Information Flow as a Safety Problem (TT, AA), pp. 352–367.
STOCSTOC-2005-KalaiLP #composition #concurrent #protocol
Concurrent general composition of secure protocols in the timing model (YTK, YL, MP), pp. 644–653.
ICALPICALP-2005-CrescenzoK #communication
Asynchronous Perfectly Secure Communication over One-Time Pads (GDC, AK), pp. 216–227.
ICALPICALP-2005-DattaDMST #logic #polynomial #probability #protocol #security #semantics
Probabilistic Polynomial-Time Semantics for a Protocol Security Logic (AD, AD, JCM, VS, MT), pp. 16–29.
ICALPICALP-2005-Hopper #on the #security
On Steganographic Chosen Covertext Security (NH), pp. 311–323.
ICALPICALP-2005-LipmaaWB #security #verification
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction (HL, GW, FB), pp. 459–471.
ICALPICALP-2005-TamassiaT #bound #security
Computational Bounds on Hierarchical Data Processing with Applications to Information Security (RT, NT), pp. 153–165.
FMFM-2005-AndronickCP #embedded #security #smarttech #source code #verification
Formal Verification of Security Properties of Smart Card Embedded Source Code (JA, BC, CPM), pp. 302–317.
FMFM-2005-BuchholtzGHM #analysis #framework #performance #security
End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform (MB, SG, VH, CM), pp. 286–301.
IFMIFM-2005-BracherK #security #specification #testing
Enabling Security Testing from Specification to Code (SB, PK), pp. 150–166.
SEFMSEFM-2005-GrandySR #java #kernel #object-oriented #verification
Object Oriented Verification Kernels for Secure Java Applications (HG, KS, WR), pp. 170–179.
CHICHI-2005-GarfinkelMSNM #email #how
How to make secure email easier to use (SLG, DM, JIS, EN, RCM), pp. 701–710.
EDOCEDOC-2005-JohanssonJ #assessment #enterprise #security
Assessment of Enterprise Information Security — The Importance of Prioritization (EJ, PJ), pp. 207–218.
ICEISICEIS-v1-2005-Fernandez #design #security #uml #using
Security Patterns and Secure Systems Design Using UML (EBF), p. 21.
ICEISICEIS-v1-2005-KaurSS #algorithm #concurrent #database #distributed #multi
Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems (NK, RS, HKS), pp. 267–272.
ICEISICEIS-v1-2005-RadhaGK #database #enterprise
Securing the Enterprise Database (VR, VPG, NHK), pp. 76–83.
ICEISICEIS-v2-2005-NixFM #correlation #multi #scalability
Anatomy of a Secure and Scalable Multiagent System for Event Capture and Correlation (TN, KF, FM), pp. 233–238.
ICEISICEIS-v3-2005-HafnerBB #architecture #security #standard #web #web service #workflow
A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together (MH, RB, MB), pp. 128–135.
ICEISICEIS-v3-2005-XuP #architecture #design #information management
Threat-Driven Architectural Design of Secure Information Systems (DX, JJP), pp. 136–143.
CIKMCIKM-2005-CarminatiFB #xml
Securing XML data in third-party distribution systems (BC, EF, EB), pp. 99–106.
KDDKDD-2005-NevilleSJKPG #information management #relational #using
Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
SEKESEKE-2005-CooperDW #approach #architecture #aspect-oriented #modelling #reuse #security
Modeling Reusable Security Aspects for Software Architectures: a Pattern Driven Approach (KMLC, LD, WEW), pp. 158–162.
SEKESEKE-2005-HanCD #mobile
Secure Electronic Commerce with Mobile Agents (SH, EC, TSD), pp. 777–782.
SEKESEKE-2005-KongOF #analysis #formal method #security #workflow
Formal Analysis of Workflow Systems with Security Considerations (WK, KO, KF), pp. 531–536.
MODELSMoDELS-2005-HafnerB #modelling #security #uml #workflow
Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0 (MH, RB), pp. 39–53.
MODELSMoDELS-2005-JurjensH #modelling #uml
Dynamic Secure Aspect Modeling with UML: From Models to Code (JJ, SHH), pp. 142–155.
MODELSMoDELS-2005-HafnerB #modelling #security #uml #workflow
Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0 (MH, RB), pp. 39–53.
MODELSMoDELS-2005-JurjensH #modelling #uml
Dynamic Secure Aspect Modeling with UML: From Models to Code (JJ, SHH), pp. 142–155.
OOPSLAOOPSLA-2005-MartinLL #fault #query #security #using
Finding application errors and security flaws using PQL: a program query language (MCM, VBL, MSL), pp. 365–383.
QAPLQAPL-2004-BodeiCDBNNP05 #evaluation #performance #protocol #security
Performance Evaluation of Security Protocols Specified in LySa (CB, MC, PD, MB, FN, HRN, CP), pp. 167–189.
PPDPPPDP-2005-EchahedP #declarative #policy #security
Security policy in a declarative style (RE, FP), pp. 153–163.
PPDPPPDP-2005-Mitchell #analysis #logic #network #protocol #security
Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
RERE-2005-GiorginiMMZ #modelling #requirements #security
Modeling Security Requirements Through Ownership, Permission and Delegation (PG, FM, JM, NZ), pp. 167–176.
RERE-2005-GiorginiMMZ05a #automation #named #requirements #security
ST-Tool: A CASE Tool for Security Requirements Engineering (PG, FM, JM, NZ), pp. 451–452.
SACSAC-2005-AdaikkalavanC #approach #named #security #web
SmartGate: a smart push-pull approach to support role-based security in web gateways (RA, SC), pp. 1727–1731.
SACSAC-2005-Khurana #scalability #security
Scalable security and accounting services for content-based publish/subscribe systems (HK), pp. 801–807.
SACSAC-2005-KhuranaSB #email #named
SELS: a secure e-mail list service (HK, AJS, RB), pp. 306–313.
SACSAC-2005-Menezes #adaptation #case study #coordination #security #self
Self-organization and computer security: a case study in adaptive coordination (RM), pp. 467–468.
SACSAC-2005-SohrDA #information management #policy #security #specification
Formal specification of role-based security policies for clinical information systems (KS, MD, GJA), pp. 332–339.
SACSAC-2005-YangEY #database #security #semistructured data #specification
Mediation security specification and enforcement for heterogeneous databases (LY, RKE, HY), pp. 354–358.
ICSEICSE-2005-AvotsDLL #analysis #c #pointer #security
Improving software security with a C pointer analysis (DA, MD, VBL, MSL), pp. 332–341.
ICSEICSE-2005-Jurjens #effectiveness #modelling #security #tool support #uml
Sound methods and effective tools for model-based security engineering with UML (JJ), pp. 322–331.
ICSEICSE-2005-Peine #re-engineering
Rules of thumb for secure software engineering (HP), pp. 702–703.
CCCC-2005-LiCKB #approach #security
A Compiler-Based Approach to Data Security (FL, GC, MTK, RRB), pp. 188–203.
CGOCGO-2005-ZhangZP
Building Intrusion-Tolerant Secure Software (TZ, XZ, SP), pp. 255–266.
HPCAHPCA-2005-ZhangGYZG #memory management #multi #named #security #symmetry
SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors (YZ, LG, JY, XZ, RG), pp. 352–362.
HPDCHPDC-2005-Thain #grid
Identity boxing: secure user-level containment for the grid (DT), pp. 299–300.
CADECADE-2005-Steel #api #constraints #deduction #modelling #security
Deduction with XOR Constraints in Security API Modelling (GS), pp. 322–336.
CAVCAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
ICLPICLP-2005-CorinSE #analysis #constraints #protocol #security
PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
LICSLICS-2005-BlanchetAF #automation #protocol #security #verification
Automated Verification of Selected Equivalences for Security Protocols (BB, MA, CF), pp. 331–340.
DACDAC-2004-RaviKLMR #design #embedded #security
Security as a new dimension in embedded system design (SR, PCK, RBL, GM, AR), pp. 753–760.
DATEDATE-v1-2004-MetraMO #design #fault #question #testing
Are Our Design for Testability Features Fault Secure? (CM, TMM, MO), pp. 714–715.
DATEDATE-v1-2004-RenaudinBPTSG #security
High Security Smartcards (MR, GFB, PP, JPT, LS, FG), pp. 228–233.
DATEDATE-v1-2004-TiriV #design #implementation #logic
A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation (KT, IV), pp. 246–251.
DATEDATE-v2-2004-GuilleyHMPP #hardware
CMOS Structures Suitable for Secured Hardware (SG, PH, YM, RP, JP), pp. 1414–1415.
SIGMODSIGMOD-2004-FanCG #query #security #xml
Secure XML Querying with Security Views (WF, CYC, MNG), pp. 587–598.
SIGMODSIGMOD-2004-Gudgin #architecture #reliability #web #web service
Secure, Reliable, Transacted; Innovation in Web Services Architecture (MG), pp. 879–880.
SIGMODSIGMOD-2004-Hall #challenge #policy #requirements
Requirements and Policy Challenges in Highly Secure Environments (DEH), pp. 897–898.
SIGMODSIGMOD-2004-Maurer #database #encryption #security
The Role of Cryptography in Database Security (UMM), pp. 5–10.
SIGMODSIGMOD-2004-RosenthalW #research #scalability #security #state of the art
Security of Shared Data in Large Systems: State of the Art and Research Directions (AR, MW), pp. 962–964.
VLDBVLDB-2004-AbiteboulABCFMS #distributed #peer-to-peer #privacy
An Electronic Patient Record “on Steroids”: Distributed, Peer-to-Peer, Secure and Privacy-conscious (SA, BA, OB, BC, IF, TM, AS), pp. 1273–1276.
VLDBVLDB-2004-RosenthalW #research #scalability #security #state of the art
Security of Shared Data in Large Systems: State of the Art and Research Directions (AR, MW), p. 1242.
VLDBVLDB-2004-YangL #information management #xml
Secure XML Publishing without Information Leakage in the Presence of Data Inference (XY, CL), pp. 96–107.
CSEETCSEET-2004-McGraw #security
Software Security Clue Distribution (GM), pp. 6–7.
ITiCSEITiCSE-WGR-2004-Campbell #assurance #security
IT security and data assurance: a new resource for two-year colleges (RDC), p. 20.
FoSSaCSFoSSaCS-2004-RamanathanMST #analysis #bisimulation #equivalence #network #probability #protocol #security
Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
TACASTACAS-2004-PiazzaPR #named #persistent #security
CoPS — Checker of Persistent Security (CP, EP, SR), pp. 144–152.
STOCSTOC-2004-HarnikNRR #perspective
Completeness in two-party secure computation: a computational view (DH, MN, OR, AR), pp. 252–261.
STOCSTOC-2004-Pass #bound #multi
Bounded-concurrent secure multi-party computation with a dishonest majority (RP), pp. 232–241.
STOCSTOC-2004-PrabhakaranS #security
New notions of security: achieving universal composability without trusted setup (MP, AS), pp. 242–251.
ICALPICALP-2004-AbadiC #equation #protocol #security
Deciding Knowledge in Security Protocols Under Equational Theories (MA, VC), pp. 46–58.
ICALPICALP-2004-AwerbuchS #distributed #protocol
Group Spreading: A Protocol for Provably Secure Distributed Name Service (BA, CS), pp. 183–195.
SEFMSEFM-2004-LanotteMT #decidability #parametricity #probability #security
Decidability Results for Parametric Probabilistic Transition Systems with an Application to Security (RL, AMS, AT), pp. 114–121.
AdaSIGAda-2004-ChapmanH #analysis #data flow #modelling #safety #security
Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
AdaSIGAda-2004-Davis #component #information management #lifecycle #security
Information systems security engineering: a critical component of the systems engineering lifecycle (JFD), pp. 13–18.
CAiSECAiSE-2004-GePL #analysis #database
Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment (XG, FP, RL), pp. 234–247.
EDOCEDOC-2004-YoshiokaHF #coordination #performance #security
Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems (NY, SH, AF), pp. 84–97.
ICEISICEIS-v2-2004-BelsisGSD #implementation #information management #security
Implementing Knowledge Management Techniques for Security Purposes (PB, SG, CS, ID), pp. 535–540.
ICEISICEIS-v3-2004-ChapmanS #enterprise #guidelines #on the #security
On Information Security Guidelines for Small/Medium Enterprises (DC, LS), pp. 3–9.
ICEISICEIS-v3-2004-FerreiraCC #approach
Securing a Web-Based EPR: An Approach to Secure a Centralized EPR Within a Hospital (AMF, RJCC, AdCP), pp. 54–59.
ICEISICEIS-v3-2004-MouratidisGM #design #information management #security #using
Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
ICEISICEIS-v3-2004-Tu #security #using
Using SAP System Configuration Security Test to Comply with Sarbanesoxley Act (JHT), pp. 581–583.
ICEISICEIS-v3-2004-VasiuD #architecture #security #web #web service #xml
A Requirement for a XML Web Services Security Architecture (LV, CD), pp. 60–66.
ICEISICEIS-v5-2004-Mikulecky #design #library #security
Digital Library: Design and Security Considerations (SM), pp. 295–300.
SEKESEKE-2004-GaoDYHBC #case study #design #security
Applying Aspect-Orientation in Designing Security Systems: A Case Study (SG, YD, HY, XH, KB, KMLC), pp. 360–365.
SEKESEKE-2004-YangEY #approach #aspect-oriented #security
Enhancing Mediation Security by Aspect-Oriented Approach (LY, RKE, HY), pp. 155–160.
SEKESEKE-2004-YuHDM #architecture #design #security
Integrating Security Administration into Software Architectures Design (HY, XH, YD, LM), pp. 416–420.
UMLUML-2004-AbieAKMR #security #uml
Integrating a Security Requirement Language with UML (HA, DBA, TK, SM, TR), pp. 350–364.
UMLUML-2004-Fernandez-MedinaP #database #development #ocl
Extending OCL for Secure Database Development (EFM, MP), pp. 380–394.
UMLUML-2004-JurjensS #automation #modelling #requirements #security #verification
Automated Verification of UMLsec Models for Security Requirements (JJ, PS), pp. 365–379.
LOPSTRLOPSTR-2004-BossiPR #imperative #security
Unwinding Conditions for Security in Imperative Languages (AB, CP, SR), pp. 85–100.
RERE-2004-HaleyLMN #requirements #security #trust
The Effect of Trust Assumptions on the Elaboration of Security Requirements (CBH, RCL, JDM, BN), pp. 102–111.
RERE-2004-LinNIJ #bound #problem #security #using
Using Abuse Frames to Bound the Scope of Security Problems (LL, BN, DCI, MJ), pp. 354–355.
SACSAC-J-2003-FenicleW04
A secure methodology for interchangeable services (BF, TW), pp. 343–349.
SACSAC-2004-BamasakZ #mobile
A secure method for signature delegation to mobile agents (OB, NZ), pp. 813–818.
SACSAC-2004-BellaR #security
Editoral message: special track on computer security (GB, PR), pp. 373–374.
SACSAC-2004-Bracha #programming language #towards
Keynote address: towards secure systems programming languages (GB), pp. 1–2.
SACSAC-2004-BravettiLZG #e-commerce #quality #security #web #web service
Web Services for E-commerce: guaranteeing security access and quality of service (MB, RL, GZ, RG), pp. 800–806.
SACSAC-2004-CarvalhoCSBF #mobile #network #security #using
Using mobile agents as roaming security guards to test and improve security of hosts and networks (MMC, TBC, NS, MRB, KMF), pp. 87–93.
SACSAC-2004-LucchiZ #coordination #data-driven #named #web #web service
WSSecSpaces: a secure data-driven coordination service for Web Services applications (RL, GZ), pp. 487–491.
FSEFSE-2004-Wolf #question #re-engineering #security
Is security engineering really just good software engineering? (ALW), p. 1.
ICSEICSE-2004-Lamsweerde #anti #requirements #security
Elaborating Security Requirements by Construction of Intentional Anti-Models (AvL), pp. 148–157.
ASPLOSASPLOS-2004-SuhLZD #data flow #execution #information management
Secure program execution via dynamic information flow tracking (GES, JWL, DZ, SD), pp. 85–96.
HPDCHPDC-2004-DenisAHVKB #communication #performance #problem #security
Wide-Area Communication for Grids: An Integrated Solution to Connectivity, Performance and Security Problems (AD, OA, RFHH, KV, TK, HEB), pp. 97–106.
OSDIOSDI-2004-LiKMS #repository
Secure Untrusted Data Repository (SUNDR) (JL, MNK, DM, DS), pp. 121–136.
OSDIOSDI-2004-RinardCDRLB #security
Enhancing Server Availability and Security Through Failure-Oblivious Computing (MCR, CC, DD, DMR, TL, WSB), pp. 303–316.
LICSLICS-2004-ChatterjeeHJ #game studies
Games with Secure Equilibria (KC, TAH, MJ), pp. 160–169.
VMCAIVMCAI-2004-BartheBR #compilation #security
Security Types Preserving Compilation: (Extended Abstract) (GB, AB, TR), pp. 2–15.
VMCAIVMCAI-2004-Guttman #protocol #security #trust
Security, Protocols, and Trust (JDG), p. 1.
DACDAC-2003-HwangLSSFYHV #design #embedded
Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system (DDH, BCL, PS, KS, YF, SY, AH, IV), pp. 60–65.
DATEDATE-2003-KazmierskiY #design #framework
A Secure Web-Based Framework for Electronic System Level Design (TJK, XQY), pp. 11140–11143.
DATEDATE-2003-RaghunathanRHQ #challenge #design #mobile
Securing Mobile Appliances: New Challenges for the System Designer (AR, SR, SH, JJQ), pp. 10176–10183.
ICDARICDAR-2003-HoqueSHFD #documentation #modelling #named #novel
SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution (SH, HS, GH, MCF, FD), pp. 1257–1261.
SIGMODSIGMOD-2003-ChoALS #named #query #xml
LockX: A System for Efficiently Querying Secure XML (SC, SAY, LVSL, DS), p. 669.
VLDBVLDB-2003-BouganimNPW #data access #encryption
Chip-Secured Data Access: Reconciling Access Rights with Data Encryption (LB, FDN, PP, LW), pp. 1133–1136.
ITiCSEITiCSE-2003-AzadeganLOWZ #security
An undergraduate track in computer security (SA, ML, MO, ALW, MZ), pp. 207–210.
ITiCSEITiCSE-2003-CampbellHK03a
The role of two-year colleges in educating the cyber-security workforce (RDC, EKH, KJK), p. 235.
ESOPESOP-2003-Comon-LundhC #security
Security Properties: Two Agents Are Sufficient (HCL, VC), pp. 99–113.
ESOPESOP-2003-GiambiagiD #implementation #on the #protocol #security
On the Secure Implementation of Security Protocols (PG, MD), pp. 144–158.
ESOPESOP-2003-Laud #analysis #data flow #encryption
Handling Encryption in an Analysis for Secure Information Flow (PL), pp. 159–173.
ESOPESOP-2003-Leroy #perspective #programming language #security #static analysis
Computer Security from a Programming Language and Static Analysis Perspective (XL), pp. 1–9.
ESOPESOP-2003-Meadows #analysis #encryption #evolution #protocol #requirements #specification #what
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
FASEFASE-2003-ScottBM #mobile #policy #security
Spatial Security Policies for Mobile Agents in a Sentient Computing Environment (DJS, ARB, AM), pp. 102–117.
CSMRCSMR-2003-LundBS #assessment #maintenance #security
Maintaining Results from Security Assessment (MSL, FdB, KS), pp. 341–350.
ICSMEICSM-2003-DaCostaDMP #security
Characterizing the “Security Vulnerability Likelihood” of Software Functions (DD, CD, SM, VP), p. 266–?.
WCREWCRE-2003-DahnM #c #program transformation #source code #using
Using Program Transformation to Secure C Programs Against Buffer Overflows (CD, SM), pp. 323–333.
STOCSTOC-2003-Lindell #bound
Bounded-concurrent secure two-party computation without setup assumptions (YL), pp. 683–692.
FMFME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security #using
SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
FMFME-2003-Vigna #security
A Topological Characterization of TCP/IP Security (GV), pp. 914–939.
SEFMSEFM-2003-BossiFPR #data flow #refinement #security
Refinement Operators and Information Flow Security (AB, RF, CP, SR), pp. 44–53.
SEFMSEFM-2003-LanotteMT #automaton #bisimulation #probability #security
Weak Bisimulation for Probabilistic Timed Automata and Applications to Security (RL, AMS, AT), pp. 34–43.
CAiSECAiSE-2003-MouratidisGM #information management #modelling #security #towards
Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems (HM, PG, GAM), pp. 63–78.
EDOCEDOC-2003-BurtBROA #data access #modelling #security #unification
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control (CCB, BRB, RRR, AMO, MA), pp. 159–173.
EDOCEDOC-2003-DimitrakosDMJP #assessment #contract #performance
Contract Performance Assessment for Secure and Dynamic Virtual Collaborations (TD, ID, ZM, AJ, CIP), pp. 62–75.
ICEISICEIS-v1-2003-AndoMKB #architecture #collaboration #database #process
An Architecture of a Secure Database for Networked Collaborative Activities (MA, KM, MK, AB), pp. 3–10.
ICEISICEIS-v2-2003-HoeschlBBMRBT #security
Structured Contextual Search for the Un Security Council (HCH, TCDB, AB, EdSM, MSR, RMB, IT), pp. 100–107.
ICEISICEIS-v3-2003-MouratidisMGG #information management #requirements #security #using
Analysing Security Requirements of Information Systems Using Tropos (HM, GAM, AG, PG), pp. 623–626.
ICEISICEIS-v3-2003-SerraoNT #analysis #open source #operating system #security
Open Source Security Analysis — Evaluating Security of Open Source vs. Closed Source Operating Systems (CS, DN, PT), pp. 433–440.
ICEISICEIS-v4-2003-BamasakZ #mobile #towards
Towards a Secure Mobile Agent Based M-Commerce System (OB, NZ), pp. 408–412.
ICEISICEIS-v4-2003-BrunsDH #smarttech
Secure Smart Card-Based Access to an E-Learning Portal (RB, JD, JvH), pp. 167–172.
ICEISICEIS-v4-2003-McPhersonHHK #architecture #security #web #web service #xml
Guardian Knowledge Farm Agents and Security Architectures: Web Services, XML, and Wireless Mappings (MM, GH, BH, GK), pp. 244–253.
ICEISICEIS-v4-2003-Vasiu #security #trust #web #web service
Security Web Services Based on Trust (LV), pp. 369–376.
CIKMCIKM-2003-SmithSJFCH
Securely sharing neuroimagery (KPS, VS, SJ, DBF, TC, JH), pp. 375–377.
SEKESEKE-2003-AbdullahS #framework #security #towards
A Step toward building Dynamic Security Infrastructure (ISA, EHS), pp. 483–488.
SEKESEKE-2003-YuHGD #architecture #design #distributed #formal method
Formal Software Architecture Design of Secure Distributed Systems (HY, XH, SG, YD), pp. 450–457.
ECOOPECOOP-2003-Abadi #security
Built-in Object Security (MA), p. 1.
ECOOPECOOP-2003-Gunter #api #embedded #security
Open APIs for Embedded Security (CAG), pp. 225–247.
REFSQREFSQ-J-2002-AntonEC03 #behaviour #policy #privacy #requirements #security
Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
RERE-2003-KaiyaSMK #analysis #java #mobile #policy #requirements #security #trade-off
Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
RERE-2003-LinNIJM #requirements #security
Introducing Abuse Frames for Analysing Security Requirements (LL, BN, DCI, MJ, JDM), pp. 371–372.
RERE-2003-Lipner #assurance #towards
The Journey Toward Secure Systems: Achieving Assurance (SBL), p. 5.
RERE-2003-LiuYM #analysis #privacy #requirements #security #social
Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
SACSAC-2003-AbendrothJ #framework #security
A Unified Security Framework for Networked Applications (JA, CDJ), pp. 351–357.
SACSAC-2003-AtluriAGA #constraints #multi #security #self
Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints (VA, NRA, AG, IA), pp. 927–934.
SACSAC-2003-YangZ #approach #data access #data flow #object-oriented
An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model (CY, CNZ), pp. 302–306.
ICSEICSE-2003-KemmererV #detection #internet #security
Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
CGOCGO-2003-ZhangG #security #slicing
Hiding Program Slices for Software Security (XZ, RG), pp. 325–336.
HPDCHPDC-2003-WelchSFBCGKMPT #grid #security
Security for Grid Services (VW, FS, ITF, JB, KC, JG, CK, SM, LP, ST), pp. 48–57.
SOSPSOSP-2003-FuCCSV #architecture #named
SHARP: an architecture for secure resource peering (YF, JSC, BNC, SS, AV), pp. 133–148.
CAVCAV-2003-BozgaLP #automation #named #protocol #security #verification
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols (LB, YL, MP), pp. 219–222.
ICLPICLP-2003-Musumbu #security #simulation
Simulating Security Systems Based on Logigrams (KM), pp. 498–499.
ICSTSAT-2003-ArmandoC #analysis #protocol #satisfiability #security
Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
VMCAIVMCAI-2003-BossiFPR #bisimulation #security #verification
Bisimulation and Unwinding for Verifying Possibilistic Security Properties (AB, RF, CP, SR), pp. 223–237.
DACDAC-2002-RaviRPS #design #framework #security
System design methodologies for a wireless security processing platform (SR, AR, NRP, MS), pp. 777–782.
VLDBVLDB-2002-BettiniJWW #policy #security
Provisions and Obligations in Policy Management and Security Applications (CB, SJ, XSW, DW), pp. 502–513.
VLDBVLDB-2002-BouganimP #data access
Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
VLDBVLDB-2002-ChoALS #evaluation #optimisation #query
Optimizing the Secure Evaluation of Twig Queries (SC, SAY, LVSL, DS), pp. 490–501.
VLDBVLDB-2002-Vingralek #database #named
GnatDb: A Small-Footprint, Secure Database System (RV), pp. 884–893.
FASEFASE-2002-BartheGH #composition #interactive #verification
Compositional Verification of Secure Applet Interactions (GB, DG, MH), pp. 15–32.
ICSMEICSM-2002-JiwnaniZ #maintenance #perspective #security
Maintaining Software with a Security Perspective (KJ, MVZ), pp. 194–203.
SASSAS-2002-Blanchet #authentication #protocol #security
From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
SASSAS-2002-CorinE #constraints #protocol #security #verification
An Improved Constraint-Based System for the Verification of Security Protocols (RC, SE), pp. 326–341.
SASSAS-2002-SabelfeldM #communication #concurrent
Securing Communication in a Concurrent Language (AS, HM), pp. 376–394.
SASSAS-2002-Zanotti #abstract interpretation #security
Security Typings by Abstract Interpretation (MZ), pp. 360–375.
STOCSTOC-2002-CanettiLOS #composition #multi
Universally composable two-party and multi-party secure computation (RC, YL, RO, AS), pp. 494–503.
STOCSTOC-2002-CrepeauGS #multi #quantum
Secure multi-party quantum computation (CC, DG, AS), pp. 643–652.
STOCSTOC-2002-DziembowskiM #bound #proving #security
Tight security proofs for the bounded-storage model (SD, UMM), pp. 341–350.
ICALPICALP-2002-IshaiK
Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials (YI, EK), pp. 244–256.
AdaEuropeAdaEurope-2002-BinderL #embedded #execution #java #kernel #reliability #using
Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications (WB, BL), pp. 125–135.
EDOCEDOC-2002-AagedalBDGRS #assessment #enterprise #modelling #risk management #security
Model-Based Risk Assessment to Improve Enterprise Security (JØA, FdB, TD, BAG, DR, KS), p. 51–?.
ICEISICEIS-2002-BelsisGS #enterprise #security
An Enterprise IT Security Data Model (MAB, ANG, LS), pp. 885–891.
ICEISICEIS-2002-HuangH #security
Managing Security in Electronic Business (KH, KH), pp. 1086–1091.
ICEISICEIS-2002-PantiSTV #automation #protocol #security #verification
Automatic Verification of Security in Payment Protocols for Electronic Commerce (MP, LS, ST, SV), pp. 968–974.
ICEISICEIS-2002-Srinivas #concept #java #network #security
Network Security Concepts and Java (RS), p. 23.
CIKMCIKM-2002-AvantBBFSW #security #semantics
Semantic technology applications for homeland security (DA, MB, CB, MF, APS, YSW), pp. 611–613.
SEKESEKE-2002-BlundoC #authentication #named #web
SAWM: a tool for secure and authenticated web metering (CB, SC), pp. 641–648.
UMLUML-2002-Jurjens #development #named #uml
UMLsec: Extending UML for Secure Systems Development (JJ), pp. 412–425.
UMLUML-2002-LodderstedtBD #modelling #named #security #uml
SecureUML: A UML-Based Modeling Language for Model-Driven Security (TL, DAB, JD), pp. 426–441.
LOPSTRLOPSTR-2002-BossiFPR #data flow #proving #security
A Proof System for Information Flow Security (AB, RF, CP, SR), pp. 199–218.
PPDPPPDP-2002-BessonLJ #stack
Secure calling contexts for stack inspection (FB, TdGdL, TPJ), pp. 76–87.
POPLPOPL-2002-AbadiB #logic programming #protocol #security #source code
Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
POPLPOPL-2002-HondaY #data flow
A uniform type structure for secure information flow (KH, NY), pp. 81–92.
RERE-2002-CrookILN #anti #requirements #security
Security Requirements Engineering: When Anti-Requirements Hit the Fan (RC, DCI, LL, BN), pp. 203–205.
SACSAC-2002-Abu-GhazalehP #execution #mobile #performance #towards #verification
Verification caching: towards efficient and secure mobile code execution environments (NBAG, DSP), pp. 964–968.
SACSAC-2002-AljarehR #collaboration #multi #network #security
A task-based security model to facilitate collaboration in trusted multi-agency networks (SA, BNR), pp. 744–749.
SACSAC-2002-BarbutiBF #abstract interpretation #bytecode #java #security
Checking security of Java bytecode by abstract interpretation (RB, CB, NDF), pp. 229–236.
SACSAC-2002-Bell #interactive #policy #security #simulation
Interactive simulation of security policies (GB), pp. 247–252.
SACSAC-2002-BinderR #java #mobile #question #using
Secure mobile agent systems using Java: where are we heading? (WB, VR), pp. 115–119.
SACSAC-2002-BorealeB #analysis #automation #protocol #security
Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
SACSAC-2002-BurnsideCMMDR #mobile #protocol #security
Proxy-based security protocols in networked mobile devices (MB, DEC, TM, AM, SD, RLR), pp. 265–272.
SACSAC-2002-DunningR #communication #security
Security status display and browser interframe communication (LAD, SR), pp. 237–241.
SACSAC-2002-FerreiraD #embedded #mobile
Blinded-key signatures: securing private keys embedded in mobile agents (LCF, RD), pp. 82–86.
SACSAC-2002-Jurjens02a #development #using
Using UMLsec and goal trees for secure systems development (JJ), pp. 1026–1030.
SACSAC-2002-TanM #mobile #security
Certificates for mobile code security (HKT, LM), pp. 76–81.
SACSAC-2002-ThompsonWM #security #testing
Software security vulnerability testing in hostile environments (HHT, JAW, FEM), pp. 260–264.
FSEFSE-2002-VetterlingWW #development
Secure systems development based on the common criteria: the PalME project (MV, GW, AKW), pp. 129–138.
ICSEICSE-2002-Butler #approach #evaluation #security
Security attribute evaluation method: a cost-benefit approach (SAB), pp. 232–240.
HPDCHPDC-2002-Johnson #design #grid #implementation #information management
Design and Implementation of Secured Information Services for the ASCI Grid (WRJ), pp. 209–214.
HPDCHPDC-2002-XieOR #distributed
A Secure Distributed Search System (YX, DRO, MKR), p. 321–?.
OSDIOSDI-2002-CastroDGRW #network #peer-to-peer
Secure Routing for Structured Peer-to-Peer Overlay Networks (MC, PD, AJG, AITR, DSW), pp. 299–314.
CAVCAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
CAVCAV-2002-ChevalierV #automation #bound #protocol #security #verification
Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
ICLPICLP-2002-JamilD #database #deduction #multi #semantics
A Model Theoretic Semantics for Multi-level Secure Deductive Databases (HMJ, GD), pp. 130–147.
RTARTA-2002-Mitchell #analysis #multi #protocol #security
Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
VMCAIVMCAI-2002-BernardeschiF #abstract interpretation #bytecode #java #model checking #security
Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode (CB, NDF), pp. 1–15.
VMCAIVMCAI-2002-FocardiPR #bisimulation #data flow #proving #security
Proofs Methods for Bisimulation Based Information Flow Security (RF, CP, SR), pp. 16–31.
ASEASE-2001-ChevalierV #lazy evaluation #protocol #security #verification
A Tool for Lazy Verification of Security Protocols (YC, LV), pp. 373–376.
ASEASE-2001-Fenkam #security #specification #verification
Security Specification and Verification (PF), p. 434.
ASEASE-2001-Hall #modelling #network #product line #security #specification #validation
Specification Modeling and Validation Applied to a Family of Network Security Products (RJH), pp. 71–80.
ESOPESOP-2001-Laud #data flow #program analysis #semantics
Semantics and Program Analysis of Computationally Secure Information Flow (PL), pp. 77–91.
ESOPESOP-2001-Mitchell #analysis #calculus #polynomial #probability #process #protocol #security
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
ESOPESOP-2001-ZdancewicM #continuation #data flow
Secure Information Flow and CPS (SZ, ACM), pp. 46–61.
FASEFASE-2001-Jurjens #development #towards #using
Towards Development of Secure Systems Using UMLsec (JJ), pp. 187–200.
SCAMSCAM-2001-WeberSR #case study #constraints #detection #optimisation #security #using
A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
WCREWCRE-2001-CifuentesWE #analysis #debugging #decompiler #security
Computer Security Analysis through Decompilation and High-Level Debugging (CC, TW, MVE), pp. 375–380.
PLDIPLDI-2001-AmmeDFR #named #representation #type safety
SafeTSA: A Type Safe and Referentially Secure Mobile-Code Representation Based on Static Single Assignment Form (WA, ND, MF, JvR), pp. 137–147.
SASSAS-2001-GordonJ #analysis #protocol #security
A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
SASSAS-2001-Myers #distributed
Security-Typed Languages and Distributed Computation (ACM), pp. 437–438.
SASSAS-2001-Schneider #security #what #why
Language-Based Security: What’s Needed and Why (FBS), p. 374.
STOCSTOC-2001-GennaroIKR #complexity #multi
The round complexity of verifiable secret sharing and secure multicast (RG, YI, EK, TR), pp. 580–589.
STOCSTOC-2001-NaorN #communication #evaluation #protocol
Communication preserving protocols for secure function evaluation (MN, KN), pp. 590–599.
FLOPSFLOPS-2001-Delzanno #case study #debugging #prolog #protocol #security #specification
Specifying and Debugging Security Protocols via Hereditary Harrop Formulas and λ Prolog — A Case-study (GD), pp. 123–137.
ICALPICALP-2001-FeigenbaumIMNSW #approximate #multi
Secure Multiparty Computation of Approximations (JF, YI, TM, KN, MS, RNW), pp. 927–938.
ICALPICALP-2001-KiayiasY #game studies #polynomial
Secure Games with Polynomial Expressions (AK, MY), pp. 939–950.
ICEISICEIS-v2-2001-MartinCLG #e-commerce #policy #security
Planning Security Policy on E-Commerce (MM, AC, JL, RG), pp. 915–919.
CIKMCIKM-2001-Rosenthal #documentation #question #security #what
What Can Researches Do to Improve Security of Data and Documents? (AR), p. 593.
ECOOPECOOP-2001-CaromelV #component #java #security
Reflections on MOPs, Components, and Java Security (DC, JV), pp. 256–274.
TOOLSTOOLS-USA-2001-McClure #how #privacy #security
Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
LOPSTRLOPSTR-2001-DelzannoE #debugging #logic programming #protocol #proving #security
Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols (GD, SE), pp. 76–90.
PADLPADL-2001-Barker #database #deduction
Secure Deductive Databases (SB), pp. 123–137.
PADLPADL-2001-BellaB #analysis #constraints #protocol #security
Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
POPLPOPL-2001-AbadiF #communication #mobile
Mobile values, new names, and secure communication (MA, CF), pp. 104–115.
POPLPOPL-2001-BugliesiC
Secure safe ambients (MB, GC), pp. 222–235.
POPLPOPL-2001-Mitchell #programming language #security
Programming language methods in computer security (JCM), pp. 1–3.
RERE-2001-Hall01a #modelling #network #security #specification #validation
Specification Modeling and Validation Applied to Network Security Gateways (RJH), pp. 289–291.
RERE-2001-Spafford #privacy #security
The Hidden Meta-Requirements of Security and Privacy (EHS), p. 10.
SACSAC-2001-VuongSD #distributed #policy #security #using #xml
Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
FSEESEC-FSE-2001-BasinRV #corba #security
A formal data-model of the CORBA security service (DAB, FR, LV), pp. 303–304.
HPDCHPDC-2001-HumphreyT #grid #security
Security Implications of Typical Grid Computing Usage Scenarios (MH, MRT), pp. 95–103.
HPDCHPDC-2001-JohnstonTJ #bibliography #security
Overview of Security Considerations for Computational and Data Grids (WEJ, ST, KRJ), pp. 439–440.
SOSPSOSP-2001-ZdancewicZNM #clustering
Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
CAVCAV-2001-SongPP #automation #generative #implementation #named #protocol #security #verification
AGVI — Automatic Generation, Verification, and Implementation of Security Protocols (DXS, AP, DP), pp. 241–245.
LICSLICS-2001-MitchellRST #analysis #calculus #probability #process #protocol #security
Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
ASEASE-2000-LiuR #automation #security #using
Automated Security Checking and Patching Using TestTalk (CL, DJR), pp. 261–264.
ESOPESOP-2000-HondaVY #behaviour #data flow #process
Secure Information Flow as Typed Process Behaviour (KH, VTV, NY), pp. 180–199.
TACASTACAS-2000-BenerecettiG #logic #model checking #protocol #security #using
Model Checking Security Protocols Using a Logic of Belief (MB, FG), pp. 519–534.
TACASTACAS-2000-ClarkeJM #partial order #protocol #reduction #security #verification
Partial Order Reductions for Security Protocol Verification (EMC, SJ, WRM), pp. 503–518.
WRLAWRLA-2000-BasinD #analysis #comparison #haskell #maude #protocol #security
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
STOCSTOC-2000-BihamBBMR #proving #quantum #security
A proof of the security of quantum key distribution (extended abstract) (EB, MB, POB, TM, VPR), pp. 715–724.
STOCSTOC-2000-KatzY #encryption #probability #security
Complete characterization of security notions for probabilistic private-key encryption (JK, MY), pp. 245–254.
STOCSTOC-2000-Kilian #theorem
More general completeness theorems for secure two-party computation (JK), pp. 316–324.
ICALPICALP-2000-AlonKKMS #scalability
Scalable Secure Storage when Half the System Is Faulty (NA, HK, MK, DM, JPS), pp. 576–587.
ICALPICALP-2000-BaudronPS #multi #security
Extended Notions of Security for Multicast Public Key Cryptosystems (OB, DP, JS), pp. 499–511.
ICALPICALP-2000-CachinCKM #mobile
One-Round Secure Computation and Secure Autonomous Mobile Agents (CC, JC, JK, JM), pp. 512–523.
WLCWLC-2000-YamamuraK #protocol
Key Agreement Protocol Securer than DLOG (AY, KK), pp. 450–465.
ICFPICFP-2000-SkalkaS #security
Static enforcement of security with types (CS, SFS), pp. 34–45.
CAiSECAiSE-2000-LiuLW #named #security
CHAOS: An Active Security Mediation System (DL, KHL, GW), pp. 232–246.
ICEISICEIS-2000-Barker #approach #logic #security
Information Security: A Logic Based Approach (SB), pp. 9–14.
ICEISICEIS-2000-HeL #protocol #towards
Towards a Secure and Complete Protocol for Electronic Commerce (RH, KL), pp. 435–441.
ECOOPECOOP-2000-Gong #security
Developing Security Systems in the Real World (LG), p. 251.
TOOLSTOOLS-ASIA-2000-KhanHZ #component #composition #security
Security Characterization of Software Components and Their Composition (KMK, JH, YZ), pp. 240–249.
TOOLSTOOLS-ASIA-2000-TaoJY #adaptation #mobile #modelling #network #research #security #self
The Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent (JT, LJr, QY), pp. 134–139.
TOOLSTOOLS-ASIA-2000-XingsheX #corba #design #implementation #security
Design and Implementation of CORBA Security Service (XZ, XL), pp. 140–147.
TOOLSTOOLS-EUROPE-2000-Macaire #framework
An Open and Secure Terminal Infrastructure for Hosting Personal Services (AM), pp. 10–21.
TOOLSTOOLS-PACIFIC-2000-SindreO #case study #elicitation #requirements #security
Eliciting Security Requirements by Misuse Cases (GS, ALO), pp. 120–131.
TOOLSTOOLS-USA-2000-MegaacheKJ #architecture #security
A Role-Based Security Architecture for Business Intelligence (SM, TK, GRRJ), pp. 295–306.
POPLPOPL-2000-Walker #policy #security #type system
A Type System for Expressive Security Policies (DW), pp. 254–267.
ICSEFoSE-2000-DevanbuS #re-engineering #roadmap #security
Software engineering for security: a roadmap (PTD, SGS), pp. 227–239.
LCTESLCTES-2000-JeongKL #concurrent #multi #realtime #using
Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version (BSJ, DK, SL), pp. 33–47.
OSDIOSDI-2000-FuKM #distributed #file system #performance
Fast and Secure Distributed Read-Only File System (KF, MFK, DM), pp. 181–196.
OSDIOSDI-2000-StrunkGSSG #self
Self-Securing Storage: Protecting Data in Compromised Systems (JDS, GRG, MLS, CANS, GRG), pp. 165–180.
WICSAWICSA-1999-Butler #security
Security Issues with the Global Command and Control System (GCCS) (SAB), pp. 407–422.
ICDARICDAR-1999-UrecheP #aspect-oriented #documentation #security
Document Transport, Transfer, and Exchange: Security and Commercial Aspects (OU, RP), pp. 585–588.
CSEETCSEET-1999-FrewMBA #re-engineering #security
Software Engineering and Security Engineering — An Argument for Merger (panel) (BF, TM, JEBI, MDA), p. 74–?.
ESOPESOP-1999-SabelfeldS #data flow #source code
A Per Model of Secure Information Flow in Sequential Programs (AS, DS), pp. 40–58.
FoSSaCSFoSSaCS-1999-Abadi #protocol #security #specification
Security Protocols and Specifications (MA), pp. 1–13.
WCREWCRE-1999-SouderM #distributed #legacy
A Tool for Securely Integrating Legacy Systems into a Distributed Environment (TSS, SM), pp. 47–55.
STOCSTOC-1999-CanettiO #what
Secure Computation with Honest-Looking Parties: What If Nobody Is Truly Honest? (Extended Abstract) (RC, RO), pp. 255–264.
STOCSTOC-1999-CrescenzoI
Security-Preserving Hardness-Amplification for Any Regular One-Way Function (GDC, RI), pp. 169–178.
FMFM-v1-1999-FocardiM #approach #security
A Uniform Approach for the Definition of Security Properties (RF, FM), pp. 794–813.
FMFM-v1-1999-GilhamRS #database #distributed
Secure Interoperation of Secure Distributed Databases (FG, RAR, VS), pp. 701–717.
FMFM-v1-1999-LincolnMMS #analysis #equivalence #polynomial #probability #security
Probabilistic Polynomial-Time Equivalence and Security Analysis (PL, JCM, MM, AS), pp. 776–793.
FMFM-v1-1999-LotzKW #hardware #security
A Formal Security Model for Microprocessor Hardware (VL, VK, GW), pp. 718–737.
FMFM-v1-1999-ZhouC #analysis #communication #formal method #protocol
Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
FMFM-v2-1999-GarbettPSA #empirical #process #synthesis
Secure Synthesis of Code: A Process Improvement Experiment (PG, JPP, MS, SA), pp. 1816–1835.
HCIHCI-EI-1999-Grinchenko #internet #quality #security
Quality of Information in Internet as an Information Security Basis (TAG), pp. 111–115.
CAiSECAiSE-1999-KangFSKM #multi #workflow
A Multilevel Secure Workflow Management System (MHK, JNF, APS, KK, JAM), pp. 271–285.
SACSAC-1999-DavisE #encryption #named #web
Emperor: Cheap Legal Secure Cryptography for the Web (CD, CFE), pp. 603–609.
SACSAC-1999-Haraty #case study #comparative #database
C2 Secure Database Management Systems — A Comparative Study (RAH), pp. 216–220.
SACSAC-1999-RowMAW #linux #network #security
Security Issues in Small Linux Networks (WMR, DJM, BLA, AHW), pp. 506–510.
LCTESLCTES-1999-LeeJS #database #protocol #realtime
A Secure Dynamic Copy Protocol in Real-Time Secure Database Systems (SL, BSJ, HS), pp. 73–79.
SOSPSOSP-1999-MazieresKKW #file system #security
Separating key management from file system security (DM, MK, MFK, EW), pp. 124–139.
CADECADE-1999-Weidenbach #analysis #automation #first-order #logic #protocol #security #towards
Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
LICSLICS-1999-MalacariaH #game studies #nondeterminism #program analysis #security
Non-Deterministic Games and Program Analysis: An Application to Security (PM, CH), pp. 443–452.
LICSLICS-1999-Paulson #protocol #proving #security
Proving Security Protocols Correct (LCP), pp. 370–381.
DACDAC-1998-HauckK #security
Data Security for Web-based CAD (SH, SK), pp. 788–793.
DATEDATE-1998-CoppensAR #analysis #fault #modelling
VHDL Modelling and Analysis of Fault Secure Systems (JC, DAK, CR), pp. 148–152.
DATEDATE-1998-NicolaidisD #design #multi #predict
Design of Fault-Secure Parity-Prediction Booth Multipliers (MN, RdOD), pp. 7–14.
SIGMODSIGMOD-1998-GodfreySE #database
Secure and Portable Database Extensibility (MWG, TM, PS, TvE), pp. 390–401.
VLDBVLDB-1998-GeorgeH #database #realtime
Secure Buffering in Firm Real-Time Database Systems (BG, JRH), pp. 464–475.
ITiCSEITiCSE-1998-MayoK #kernel #programming
A secure networked laboratory for kernel programming (JM, PK), pp. 175–177.
FMFM-1998-KoobUW #formal method #modelling #policy #process #security #topic #using
The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
AdaSIGAda-1998-MichellSW #safety #security
Looking into Safety with the Safety and Security Rapporteur Group (SM, MS, BAW), pp. 7–11.
ICPRICPR-1998-TirkelSHO #array
Secure arrays for digital watermarking (AZT, RGvS, TEH, CFO), pp. 1643–1645.
KDDKDD-1998-LaneB #concept #identification #learning #online #security
Approaches to Online Learning and Concept Drift for User Identification in Computer Security (TL, CEB), pp. 259–263.
POPLPOPL-1998-LeroyR #security
Security Properties of Typed Applets (XL, FR), pp. 391–403.
POPLPOPL-1998-SmithV #concurrent #data flow #imperative #multi #thread
Secure Information Flow in a Multi-Threaded Imperative Language (GS, DMV), pp. 355–364.
HPDCHPDC-1998-ForslundGG #collaboration #corba #java #named
TeleMed: Wide-Area, Secure, Collaborative Object Computing with Java and CORBA for Healthcare (DWF, JEG, EMG), pp. 30–33.
CAVCAV-1998-HoffmanP #experience #formal method
A Formal Method Experience at Secure Computing Corporation (JH, CP), pp. 49–56.
CAVCAV-1998-Mitchell #analysis #finite #protocol #security
Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
LICSLICS-1998-AbadiFG #abstraction #implementation
Secure Implementation of Channel Abstractions (MA, CF, GG), pp. 105–116.
DATEEDTC-1997-DuarteNBZ #design #implementation
Fault-secure shifter design: results and implementations (RdOD, MN, HB, YZ), pp. 335–341.
SIGMODSIGMOD-1997-GeorgeH #database #realtime #transaction
Secure Transaction Processing in Firm Real-Time Database Systems (BG, JRH), pp. 462–473.
ICSMEICSM-2000-BasharKKSW #security #tool support
Low-threat security patches and tools (MAB, GK, MGK, EHS, SSWJ), pp. 306–313.
HCIHCI-SEC-1997-HondaKTOOM
A Virtual Office Environment for Supporting Informal Communications and Securing Personal Space (SH, TK, HT, TO, KiO, YM), pp. 909–912.
SACSAC-1997-Panda #approach #multi #transaction
An alternative approach to serialization of multilevel secure Transactions (BP), pp. 134–135.
ESECESEC-FSE-1997-Kemmerer #distributed #security
Security Issues in Distributed Software (RAK), pp. 52–59.
ICSEICSE-1997-Hefner #lessons learnt #maturity #security
Lessons Learned with the Systems Security Engineering Capability Maturity Model (RH), pp. 566–567.
HPDCHPDC-1997-FosterKKKT #distributed #framework
A Secure Communications Infrastructure for High-Performance Distributed Computing (ITF, NTK, CK, GK, ST), pp. 125–136.
SOSPSOSP-1997-WallachBDF #architecture #java #security
Extensible Security Architecture for Java (DSW, DB, DD, EWF), pp. 116–128.
SIGMODSIGMOD-1996-Tajima #database #detection #object-oriented #security #static analysis
Static Detection of Security Flaws in Object-Oriented Databases (KT), pp. 341–352.
TACASTACAS-1996-FocardiG #automation #composition #security #verification
Automatic Compositional Verification of Some Security Properties (RF, RG), pp. 167–186.
STOCSTOC-1996-CanettiFGN #adaptation #multi
Adaptively Secure Multi-Party Computation (RC, UF, OG, MN), pp. 639–648.
FMFME-1996-BrookesFL #case study #comparative #component #specification
Formal and Informal Specifications of a Secure System Component: Final Results in a Comparative Study (TMB, JSF, PGL), pp. 214–227.
AdaEuropeAdaEurope-1996-KienzleWS #ada #communication #distributed
Secure Communication in Distributed Ada (JK, TW, AS), pp. 198–210.
KDDAKDDM-1996-ApteH #predict
Predicting Equity Returns from Securities Data (CA, SJH), pp. 541–560.
SACSAC-1996-McBride #security
Security considerations for active messages (RAM), pp. 463–467.
STOCSTOC-1995-BellareR
Provably secure session key distribution: the three party case (MB, PR), pp. 57–66.
STOCSTOC-1995-FranklinY #privacy
Secure hypergraphs: privacy from partial broadcast (Extended Abstract) (MKF, MY), pp. 36–44.
STOCSTOC-1995-Yao #metric #protocol #quantum #security
Security of quantum protocols against coherent measurements (ACCY), pp. 67–75.
VLDBVLDB-1994-IdrisGC #database #security
Providing Dynamic Security Control in a Federated Database (NBI, WAG, RFC), pp. 13–23.
VLDBVLDB-1994-JonscherD #approach #database
An Approach for Building Secure Database Federations (DJ, KRD), pp. 24–35.
STOCSTOC-1994-FeigeKN
A minimal model for secure computation (extended abstract) (UF, JK, MN), pp. 554–563.
STOCSTOC-1994-SantisDFY #how
How to share a function securely (ADS, YD, YF, MY), pp. 522–533.
FMFME-1994-Cherkaoui #analysis #security #specification
Specification and Analysis of a Security Management System (OC), pp. 66–82.
FMFME-1994-FitzgeraldBGL #case study #comparative #component #specification
Formal and Informal Specifications of a Secure System Component: first results in a comparative study (JSF, TMB, MAG, PGL), pp. 35–44.
AdaTRI-Ada-1994-Aldrich #ada #architecture
Secured Systems and Ada: A Trusted System Software Architecture (MA), pp. 282–292.
CAiSECAiSE-1994-HofmannH #design #information management #quality #requirements #security
Reaching out for Quality: Considering Security Requirements in the Design of Information Systems (HFH, RH), pp. 105–118.
CIKMCIKM-1994-PissinouMP #framework #modelling #multi #towards
Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models (NP, KM, EKP), pp. 280–287.
KDDKDD-1994-ApteH #generative #predict
Predicting Equity Returns from Securities Data with Minimal Rule Generation (CA, SJH), pp. 407–418.
SACSAC-1994-ChangGVWO #empirical #reuse #security #social
A reuse experiment in the social security sector (SCC, APMG, HvV, EW, HO), pp. 94–98.
SACSAC-1994-PandaPH #database #multi #query #transaction
Secure transaction management and query processing in multilevel secure database systems (BP, WP, RAH), pp. 363–368.
DACDAC-1993-KarriO #architecture #synthesis
High-Level Synthesis of Fault-Secure Microarchitectures (RK, AO), pp. 429–433.
STOCSTOC-1993-Ben-OrCG
Asynchronous secure computation (MBO, RC, OG), pp. 52–61.
ICALPICALP-1993-FranklinY #performance
Secure and Efficient Off-Line Digital Money (Extended Abstract) (MKF, MY), pp. 265–276.
FMFME-1993-Boswell #policy #security #specification #validation
Specification and Validation of a Security Policy Model (AB), pp. 42–51.
CAiSECAiSE-1993-Chung #development #information management #requirements #security
Dealing with Security Requirements During the Development of Information Systems (LC), pp. 234–251.
CIKMCIKM-1993-Anderson #approach #database #deduction #knowledge base #multi #problem #statistics
A Dynamic Knowledge Based Approach to the Problem of Deduction in a Non-Statistical Multilevel Secure Database (MA), pp. 154–163.
CIKMCIKM-1993-Maine #bound #named #performance
HSGIMS — A Secure High-Speed Tool with Bound Search Times for Transparently Managing and Manipulating Information (PADdM), pp. 216–222.
TOOLSTOOLS-EUROPE-1993-DollimoreX #security
The Private Access Channel: A Security Mechanism for Shared Distribution Objects (JD, WX), pp. 211–221.
STOCSTOC-1992-FranklinY #communication #complexity
Communication Complexity of Secure Computation (Extended Abstract) (MKF, MY), pp. 699–710.
AdaTRI-Ada-C-1992-McHugh #ada #safety
Ada 9X and Safety Critical/Secure Systems (JM), pp. 55–59.
SOSPSOSP-WIP-1991-Reiter92 #distributed #security
Integrating Security in a Group Oriented Distributed System (Abstract) (MKR), p. 27.
SIGMODSIGMOD-1991-JajodiaS #multi #relational #towards
Towards a Multilevel Secure Relational Data Model (SJ, RSS), pp. 50–59.
STOCSTOC-1991-Maurer #encryption #independence #security
Perfect Cryptographic Security from Partially Independent Channels (UMM), pp. 561–571.
FMVDME-1991-1-SmithK #development #transaction
The Formal Development of a Secure Transaction Mechanism (PS, RK), pp. 457–476.
KDDKDD-1991-OLeary #database #information management #security
Knowledge Discovery as a Threat to Database Security (DEO), pp. 507–516.
ICSEICSE-1991-Jahl #evaluation #security
The Information Technology Security Evaluation Criteria (CJ), pp. 306–312.
SIGMODSIGMOD-1990-KoganJ #architecture #concurrent #database #multi
Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture (BK, SJ), pp. 153–162.
STOCSTOC-1990-BeaverMR #complexity #protocol
The Round Complexity of Secure Protocols (Extended Abstract) (DB, SM, PR), pp. 503–513.
STOCSTOC-1990-NaorY
Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
STOCSTOC-1990-Rompel
One-Way Functions are Necessary and Sufficient for Secure Signatures (JR), pp. 387–394.
OOPSLAOOPSLA-1989-Thuraisingham #database #object-oriented #security
Mandatory Security in Object-Oriented Database Systems (BMT), pp. 203–210.
SIGMODSIGMOD-1988-MazumdarSS #proving #security #theorem proving #using
Resolving the Tension between Integrity and Security Using a Theorem Prover (SM, DWS, TS), pp. 233–242.
STOCSTOC-1988-ChaumCD #multi #protocol
Multiparty Unconditionally Secure Protocols (Extended Abstract) (DC, CC, ID), pp. 11–19.
SIGMODSIGMOD-1987-Morgenstern #database #knowledge base #multi #security
Security and Inference in Multilevel Database and Knowledge-Base Systems (MM), pp. 357–373.
VLDBVLDB-1986-SpoonerKWSH #ada #component #framework #security
Framework for the Security Component of an Ada DBMS (DLS, AMK, GW, JS, DH), pp. 347–354.
STOCSTOC-1986-Cleve #security
Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract) (RC), pp. 364–369.
STOCSTOC-1985-HastadS #encryption #security
The Cryptographic Security of Truncated Linearly Related Variables (JH, AS), pp. 356–362.
STOCSTOC-1983-Ben-OrCS #encryption #on the #security
On the Cryptographic Security of Single RSA Bits (MBO, BC, AS), pp. 421–430.
POPLPOPL-1983-Strom #security
Mechanisms for Compile-Time Enforcement of Security (RES), pp. 276–284.
SOSPSOSP-1983-Silverman #kernel #operating system #security #verification
Reflections on the Verification of the Security of an Operating System Kernel (JMS), pp. 143–154.
VLDBVLDB-1981-BussolatiM #approach #database #modelling #security
A Database Approach to Modelling and Managing Security Information (UB, GM), pp. 532–542.
SOSPSOSP-1981-Rushby #design #verification
Design and Verification of Secure Systems (JMR), pp. 12–21.
SOSPSOSP-J-1979-WalkerKP80 #kernel #security #specification #verification
Specification and Verification of the UCLA Unix Security Kernel (BJW, RAK, GJP), pp. 118–131.
VLDBVLDB-1979-DownsP #database #security
Data Base Management Systems Security and INGRES (DD, GJP), pp. 280–290.
SOSPSOSP-1979-WalkerKP #kernel #security #specification #verification
Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract) (BJW, RAK, GJP), pp. 64–65.
VLDBVLDB-1978-Davida #privacy #security
Security and Privacy (GID), p. 54.
VLDBVLDB-1978-HsiaoKM #database #privacy #security
Privacy and Security of Data Communications and Data Bases (DKH, DSK, SEM), pp. 55–67.
VLDBVLDB-1977-DownsP #database #design #kernel
A Kernel Design for a Secure Data Base Management System (DD, GJP), pp. 507–514.
SOSPSOSP-1977-FeiertagLR #design #multi #proving #security
Proving Multilevel Security of a System Design (RJF, KNL, LR), pp. 57–65.
ICSEICSE-1976-Hsiao #design #experience #implementation #re-engineering
A Software Engineering Experience in the Management, Design and Implementation of A Data Secure System (DKH), pp. 532–538.
ICSEICSE-1976-NeumannFLR #development #multi #proving #security
Software Development and Proofs of Multi-Level Security (PGN, RJF, KNL, LR), pp. 421–428.
SOSPSOSP-J-1975-Denning76 #data flow
A Lattice Model of Secure Information Flow (DED), pp. 236–243.
SOSPSOSP-J-1975-Millen76 #kernel #security #validation
Security Kernel Validation in Practice (JKM), pp. 243–250.
SOSPSOSP-1975-JonesL #policy #security
The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.
SOSPSOSP-1975-Schroeder #kernel #multi #security
Engineering a Security Kernel for Multics (MDS), pp. 25–32.

Bibliography of Software Language Engineering in Generated Hypertext (BibSLEIGH) is created and maintained by Dr. Vadim Zaytsev.
Hosted as a part of SLEBOK on GitHub.