1123 papers:
- ECSA-2015-FernandezAP #architecture #security
- Revisiting Architectural Tactics for Security (EBF, HA, GPG), pp. 55–69.
- QoSA-2015-MyllarniemiRM #configuration management #product line #representation #security #variability
- Representing and Configuring Security Variability in Software Product Lines (VM, MR, TM), pp. 1–10.
- CASE-2015-JiangDZZ #formal method #mobile #modelling #verification
- Formal modeling and verification of secure mobile agent systems (MJ, ZD, MZ, YZ), pp. 545–550.
- DAC-2015-GuoDJFM #formal method #perspective #security #validation #verification
- Pre-silicon security verification and validation: a formal perspective (XG, RGD, YJ, FF, PM), p. 6.
- DAC-2015-KimLRJR
- Vibration-based secure side channel for medical devices (YK, WSL, VR, NKJ, AR), p. 6.
- DAC-2015-LiuWLCWBQ #challenge #design #security
- Cloning your mind: security challenges in cognitive system designs and their solutions (BL, CW, HL, YC, QW, MB, QQ), p. 5.
- DAC-2015-MundhenkSLFC #analysis #architecture #model checking #probability #security #using
- Security analysis of automotive architectures using probabilistic model checking (PM, SS, ML, SAF, SC), p. 6.
- DAC-2015-Peeters #architecture #security
- SoC security architecture: current practices and emerging needs (EP), p. 6.
- DAC-2015-RayYBB #correctness #design #security #validation
- Correctness and security at odds: post-silicon validation of modern SoC designs (SR, JY, AB, SB), p. 6.
- DAC-2015-SadeghiWW #challenge #industrial #internet #privacy #security
- Security and privacy challenges in industrial internet of things (ARS, CW, MW), p. 6.
- DAC-2015-ShreejithF #embedded #generative #network #security
- Security aware network controllers for next generation automotive embedded systems (SS, SAF), p. 6.
- DAC-2015-WachsI #challenge #design #hardware #integration #security
- Design and integration challenges of building security hardware IP (MW, DI), p. 6.
- DAC-2015-ZhengLDGZS #design #security #verification
- Design and verification for transportation system security (BZ, WL, PD, LG, QZ, NS), p. 6.
- DATE-2015-LeeLMHP #monitoring #named #security
- Extrax: security extension to extract cache resident information for snoop-based external monitors (JL, YL, HM, IH, YP), pp. 151–156.
- DATE-2015-MacherSBAK #analysis #named
- SAHARA: a security-aware hazard and risk analysis method (GM, HS, RB, EA, CK), pp. 621–624.
- DATE-2015-MundhenkSLFC #authentication #lightweight #network
- Lightweight authentication for secure automotive networks (PM, SS, ML, SAF, SC), pp. 285–288.
- DATE-2015-TangAKP #communication #configuration management
- Dynamic reconfigurable puncturing for secure wireless communication (LT, JAA, AK, SP), pp. 888–891.
- SIGMOD-2015-LallaliAPP
- A Secure Search Engine for the Personal Cloud (SL, NA, ISP, PP), pp. 1445–1450.
- SIGMOD-2015-OktayMKK #hybrid #named #performance #pipes and filters
- SEMROD: Secure and Efficient MapReduce Over HybriD Clouds (KYO, SM, VK, MK), pp. 153–166.
- VLDB-2015-HeWKCLYL #named #query
- SDB: A Secure Query Processing System with Data Interoperability (ZH, WKW, BK, DWLC, RL, SMY, EL), pp. 1876–1887.
- ITiCSE-2015-AlshammariAH #adaptation #education #learning #security
- The Impact of Learning Style Adaptivity in Teaching Computer Security (MA, RA, RJH), pp. 135–140.
- TACAS-2015-ArmandoBCCMMM #framework #mobile #named #security #static analysis #verification
- SAM: The Static Analysis Module of the MAVERIC Mobile App Security Verification Platform (AA, GB, GC, GC, GDM, RM, AM), pp. 225–230.
- SANER-2015-CadariuBVD #security
- Tracking known security vulnerabilities in proprietary software systems (MC, EB, JV, AvD), pp. 516–519.
- SCAM-2015-RenatusBE #modelling #security #using
- Improving prioritization of software weaknesses using security models with AVUS (SR, CB, JE), pp. 259–264.
- PLDI-2015-JohnsonWMC #dependence #graph #security
- Exploring and enforcing security guarantees via program dependence graphs (AJ, LW, SM, SC), pp. 291–302.
- CIAA-2015-DangDFH #automaton #security
- Security of Numerical Sensors in Automata (ZD, DD, TRF, WJHI), pp. 76–88.
- ICALP-v2-2015-GoldwasserKP #adaptation #revisited
- Adaptively Secure Coin-Flipping, Revisited (SG, YTK, SP), pp. 663–674.
- ICALP-v2-2015-Raykov
- Broadcast from Minicast Secure Against General Adversaries (PR), pp. 701–712.
- FM-2015-LiSLD #protocol #security #verification
- Verifying Parameterized Timed Security Protocols (LL, JS, YL, JSD), pp. 342–359.
- FM-2015-LiuH #analysis #android #case study #kernel #security
- Case Study: Static Security Analysis of the Android Goldfish Kernel (TL, RH), pp. 589–592.
- SEFM-2015-LarmuseauC #formal method #interface
- Formalizing a Secure Foreign Function Interface (AL, DC), pp. 215–230.
- CHI-2015-EgelmanP #behaviour #scalability #security
- Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS) (SE, EP), pp. 2873–2882.
- CHI-2015-HangLH #authentication #exclamation #security #smarttech #what
- I Know What You Did Last Week! Do You?: Dynamic Security Questions for Fallback Authentication on Smartphones (AH, ADL, HH), pp. 1383–1392.
- CHI-2015-IsmailAKR #crowdsourcing #security
- Crowdsourced Exploration of Security Configurations (QI, TA, AK, MKR), pp. 467–476.
- CHI-2015-MeutznerGK #difference
- Constructing Secure Audio CAPTCHAs by Exploiting Differences between Humans and Machines (HM, SG, DK), pp. 2335–2338.
- CHI-2015-WinklerGLHSDR #security #smarttech
- Glass Unlock: Enhancing Security of Smartphone Unlocking through Leveraging a Private Near-eye Display (CW, JG, ADL, GH, PS, DD, ER), pp. 1407–1410.
- CHI-2015-ZezschwitzLBH #named #performance #smarttech
- SwiPIN: Fast and Secure PIN-Entry on Smartphones (EvZ, ADL, BB, HH), pp. 1403–1406.
- CSCW-2015-DasKDH #security #social
- The Role of Social Influence in Security Feature Adoption (SD, ADIK, LAD, JIH), pp. 1416–1426.
- HCI-DE-2015-SugiuraSO #implementation #metric #security #using
- Improving IT Security Through Security Measures: Using Our Game-Theory-Based Model of IT Security Implementation (MS, HS, TO), pp. 82–95.
- HCI-DE-2015-Uchida #approach #security
- A Psychological Approach to Information Security — Some Ideas for Establishing Information Security Psychology (KU), pp. 96–104.
- HCI-UC-2015-FukuzawaSU #bibliography #risk management #security
- Survey on Risk Management Based on Information Security Psychology (YF, MS, HU), pp. 396–408.
- HIMI-IKD-2015-TrevisanPMG #big data #health #industrial #problem #security #visualisation
- Big Data Visualization for Occupational Health and Security Problem in Oil and Gas Industry (DGT, NSP, LM, ACBG), pp. 46–54.
- ICEIS-v1-2015-YakhyaevaY #algorithm
- An Algorithm to Compare Computer-security Knowledge from Different Sources (GY, OY), pp. 565–572.
- ICEIS-v2-2015-BarbarI #named
- BlueKey — A Bluetooth Secure Solution for Accessing Personal Computers (AB, AI), pp. 509–515.
- ICEIS-v2-2015-MazurKW #data access #modelling #on the #performance #security
- On the Modelling of the Influence of Access Control Management to the System Security and Performance (KM, BK, AW), pp. 346–354.
- ICML-2015-XiaoBBFER #feature model #question
- Is Feature Selection Secure against Training Data Poisoning? (HX, BB, GB, GF, CE, FR), pp. 1689–1698.
- SEKE-2015-FaniB #ontology #security
- An Ontology for Describing Security Events (HF, EB), pp. 455–460.
- SEKE-2015-HuangWSQ #android #fine-grained #named #policy #security
- DefDroid: Securing Android with Fine-Grained Security Policy (CH, SW, HS, ZQ), pp. 375–378.
- SEKE-2015-PereiraRA #data access #database #distributed #stack
- Secure, Dynamic and Distributed Access Control Stack for Database Applications (ÓMP, DDR, RLA), pp. 364–369.
- SEKE-2015-XuB #multi #reliability #using
- A Reliable and Secure Cloud Storage Schema Using Multiple Service Providers (HX, DB), pp. 116–121.
- SIGIR-2015-YangS #information retrieval #privacy #security
- Privacy-Preserving IR 2015: When Information Retrieval Meets Privacy and Security (HY, IS), pp. 1157–1158.
- MoDELS-2015-NguyenYHKST #design pattern #named #security
- SoSPa: A system of Security design Patterns for systematically engineering secure systems (PHN, KY, TH, JK, RS, YLT), pp. 246–255.
- Onward-2015-ArztNABEM #encryption #integration #towards
- Towards secure integration of cryptographic software (SA, SN, KA, EB, SE, MM), pp. 1–13.
- QAPL-2015-MartinelliMS #security #specification
- Semiring-based Specification Approaches for Quantitative Security (FM, IM, FS), pp. 95–109.
- PADL-2015-BalducciniKS #semantics
- Ontology-Driven Data Semantics Discovery for Cyber-Security (MB, SK, JS), pp. 1–16.
- POPL-2015-NgoMMP #black box #policy #runtime #security #source code
- Runtime Enforcement of Security Policies on Black Box Reactive Programs (MN, FM, DM, FP), pp. 43–54.
- REFSQ-2015-GramaticaLMPT #assessment #empirical #risk management #security
- The Role of Catalogues of Threats and Security Controls in Security Risk Assessment: An Empirical Study with ATM Professionals (MdG, KL, FM, FP, AT), pp. 98–114.
- REFSQ-2015-LiHM #requirements #security #specification
- Analyzing and Enforcing Security Mechanisms on Requirements Specifications (TL, JH, JM), pp. 115–131.
- SAC-2015-BeckersHMG #internet #security
- Engineering trust- and reputation-based security controls for future internet systems (KB, MH, FM, MCFG), pp. 1344–1349.
- SAC-2015-OliveiraLV #framework #performance #security #web #web service
- Characterizing the performance of web service frameworks under security attacks (RAO, NL, MV), pp. 1711–1718.
- SAC-2015-PiMMG #analysis #health #ontology #security
- Ontology definition and cognitive analysis in ocupational health and security (OHS) environments (NSP, LM, JMM, ACBG), pp. 201–206.
- SAC-2015-ShahriarH #approach #assessment #metric #risk management #security #web
- Security assessment of clickjacking risks in web applications: metrics based approach (HS, HMH), pp. 791–797.
- SAC-2015-TambeN #behaviour #game studies #modelling #resource management #robust #security
- Robust resource allocation in security games and ensemble modeling of adversary behavior (AT, TN), pp. 277–282.
- SAC-2015-VecchiatoVM #android #assessment #security
- A security configuration assessment for android devices (DV, MV, EM), pp. 2299–2304.
- SAC-2015-WangYCDGW #documentation #named #physics #security
- Cryptopaper: digital information security for physical documents (PW, XY, SC, PD, SG, TW), pp. 2157–2164.
- ESEC-FSE-2015-Feth #optimisation #security #trade-off
- User-centric security: optimization of the security-usability trade-off (DF), pp. 1034–1037.
- ESEC-FSE-2015-GhaisasMBGKV #automation #security #towards
- Towards automating the security compliance value chain (SG, MM, BB, AG, RK, HMV), pp. 1014–1017.
- ESEC-FSE-2015-SmithJMCL #developer #security #static analysis
- Questions developers ask while diagnosing potential security vulnerabilities with static analysis (JS, BJ, ERMH, BC, HRL), pp. 248–259.
- ESEC-FSE-2015-WitscheyZWMMZ #developer #security #tool support
- Quantifying developers’ adoption of security tools (JW, OZ, AKW, ERMH, CBM, TZ), pp. 260–271.
- ICSE-v1-2015-YskoutSJ #design #question #security
- Do Security Patterns Really Help Designers? (KY, RS, WJ), pp. 292–302.
- ICSE-v2-2015-Berghe #analysis #security #towards
- Towards a Practical Security Analysis Methodology (AvDB), pp. 883–886.
- ICSE-v2-2015-DoligezFHM #development #functional #programming #security #validation #xml
- Avoiding Security Pitfalls with Functional Programming: A Report on the Development of a Secure XML Validator (DD, CF, TH, MM), pp. 209–218.
- ICSE-v2-2015-HollandDKMR #android #detection #novel #security
- Security Toolbox for Detecting Novel and Sophisticated Android Malware (BH, TD, SK, JM, NR), pp. 733–736.
- ICSE-v2-2015-Morrison #evaluation #framework #security
- A Security Practices Evaluation Framework (PM), pp. 935–938.
- ICSE-v2-2015-SadeghiBM #analysis #android #security #using
- Analysis of Android Inter-App Security Vulnerabilities Using COVERT (AS, HB, SM), pp. 725–728.
- ICSE-v2-2015-SimpsonMCFMR #case study #education #experience #security
- Experiences in Developing and Delivering a Programme of Part-Time Education in Software and Systems Security (ACS, AM, CJFC, IF, IM, KBR), pp. 435–444.
- ICSE-v2-2015-TsigkanosPGN #adaptation #cyber-physical #named #security
- Ariadne: Topology Aware Adaptive Security for Cyber-Physical Systems (CT, LP, CG, BN), pp. 729–732.
- ASPLOS-2015-HicksSKS #debugging #lightweight #named #runtime #specification
- SPECS: A Lightweight Runtime Mechanism for Protecting Software from Security-Critical Processor Bugs (MH, CS, STK, JMS), pp. 517–529.
- ASPLOS-2015-ZhangWSM #data flow #design #hardware #information management #security
- A Hardware Design Language for Timing-Sensitive Information-Flow Security (DZ, YW, GES, ACM), pp. 503–516.
- LCTES-2015-LiuY #encryption #framework #in memory #memory management
- Secure and Durable (SEDURA): An Integrated Encryption and Wear-leveling Framework for PCM-based Main Memory (CL, CY), p. 10.
- ICST-2015-CarboneCPP #identification #security #testing
- Security Threat Identification and Testing (RC, LC, AP, SEP), pp. 1–8.
- ICST-2015-KobashiYWFYOK #design pattern #named #security #testing #verification
- TESEM: A Tool for Verifying Security Design Pattern Applications by Model Testing (TK, MY, HW, YF, NY, TO, HK), pp. 1–8.
- ISSTA-2015-DahseH #case study #empirical #experience #php #security
- Experience report: an empirical study of PHP security mechanism usage (JD, TH), pp. 60–70.
- ISSTA-2015-Hothersall-Thomas #automation #named #security #testing
- BrowserAudit: automated testing of browser security features (CHT, SM, CN), pp. 37–47.
- TAP-2015-BloemHRS #automation #case study #generative #implementation #testing
- Case Study: Automatic Test Case Generation for a Secure Cache Implementation (RB, DMH, FR, RS), pp. 58–75.
- ECSA-2014-HorcasPF #policy #runtime #security
- Runtime Enforcement of Dynamic Security Policies (JMH, MP, LF), pp. 340–356.
- ASE-2014-NearJ #analysis #interactive #named #security #web
- Derailer: interactive security analysis for web applications (JPN, DJ), pp. 587–598.
- ASE-2014-StephenSSE #big data #program analysis
- Program analysis for secure big data processing (JJS, SS, RS, PTE), pp. 277–288.
- DAC-2014-AgostaBPS #approach #embedded #encryption #execution #multi
- A Multiple Equivalent Execution Trace Approach to Secure Cryptographic Embedded Software (GA, AB, GP, MS), p. 6.
- DAC-2014-HerrewegeV
- Software Only, Extremely Compact, Keccak-based Secure PRNG on ARM Cortex-M (AVH, IV), p. 6.
- DAC-2014-HuWTT #hardware #monitoring #network #security
- System-Level Security for Network Processors with Hardware Monitors (KH, TW, TT, RT), p. 6.
- DAC-2014-KannanKS #in memory #memory management
- Secure Memristor-based Main Memory (SK, NK, OS), p. 6.
- DAC-2014-TrimbergerM #security
- FPGA Security: From Features to Capabilities to Trusted Systems (ST, JM), p. 4.
- DAC-2014-ZalmanM #communication #low cost
- A Secure but still Safe and Low Cost Automotive Communication Technique (RZ, AM), p. 5.
- DATE-2014-CortezRHN #testing
- Testing PUF-based secure key storage circuits (MC, GR, SH, GDN), pp. 1–6.
- DATE-2014-HanZLD #named #scheduling
- SAFE: Security-Aware FlexRay Scheduling Engine (GH, HZ, YL, WD), pp. 1–4.
- DATE-2014-Jin #evaluation #proving #security #tool support #trust
- EDA tools trust evaluation through security property proofs (YJ), pp. 1–4.
- DATE-2014-RostamiWPK #challenge #roadmap #security
- Quo vadis, PUF?: Trends and challenges of emerging physical-disorder based security (MR, JBW, MP, FK), pp. 1–6.
- DATE-2014-RuhrmairSB #how
- Special session: How secure are PUFs really? On the reach and limits of recent PUF attacks (UR, US, WB), pp. 1–4.
- DATE-2014-SubramanyanA #design #security #verification
- Formal verification of taint-propagation security properties in a commercial SoC design (PS, DA), pp. 1–2.
- SIGMOD-2014-BenderKG #database #relational #security
- Explainable security for relational databases (GB, LK, JG), pp. 1411–1422.
- SIGMOD-2014-WongKCLY #database #query
- Secure query processing with data interoperability in a cloud database environment (WKW, BK, DWLC, RL, SMY), pp. 1395–1406.
- VLDB-2014-GuarnieriB #query
- Optimal Security-Aware Query Processing (MG, DAB), pp. 1307–1318.
- ITiCSE-2014-GuoBQLH #assurance #education #security
- Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs (MG, PB, KQ, CTDL, XH), p. 343.
- ITiCSE-2014-MaTKMSW #algorithm #named #visualisation
- SHAvisual: a secure hash algorithm visualization tool (JM, JT, MSK, JM, CKS, CW), p. 338.
- ITiCSE-2014-SirajGTH #security #topic
- Empowering faculty to embed security topics into computer science courses (AS, SG, JT, AH), pp. 99–104.
- ITiCSE-2014-WangCMSW #data access #education #multi #named #security #using #visualisation
- MLSvisual: a visualization tool for teaching access control using multi-level security (MW, SC, JM, CKS, CW), pp. 93–98.
- ESOP-2014-LaunchburyADM #multi
- Application-Scale Secure Multiparty Computation (JL, DA, TD, EM), pp. 8–26.
- FASE-2014-SadeghiEM #analysis #mining #repository #security
- Mining the Categorized Software Repositories to Improve the Analysis of Security Vulnerabilities (AS, NE, SM), pp. 155–169.
- TACAS-2014-ArmandoCC #model checking #named #satisfiability
- SATMC: A SAT-Based Model Checker for Security-Critical Systems (AA, RC, LC), pp. 31–45.
- CSMR-WCRE-2014-BuchlerHMMGO #model inference #security #testing
- Model inference and security testing in the spacios project (MB, KH, PFM, MM, RG, CO), pp. 411–414.
- CSMR-WCRE-2014-MihanceaM #named #security #verification #web
- JMODEX: Model extraction for verifying security properties of web applications (PFM, MM), pp. 450–453.
- MSR-2014-PleteaVS #analysis #git #security #sentiment
- Security and emotion: sentiment analysis of security discussions on GitHub (DP, BV, AS), pp. 348–351.
- SCAM-2014-TliliFBDH #scalability #security #verification
- Scalable Security Verification of Software at Compile Time (ST, JMF, AB, BD, SH), pp. 115–124.
- PEPM-J-2013-WeijersHH14 #fault #higher-order #polymorphism #security
- Security type error diagnosis for higher-order, polymorphic languages (JW, JH, SH), pp. 200–218.
- STOC-2014-GenkinIPST
- Circuits resilient to additive attacks with applications to secure computation (DG, YI, MP, AS, ET), pp. 495–504.
- STOC-2014-MillerS #protocol #quantum #robust #using
- Robust protocols for securely expanding randomness and distributing keys using untrusted quantum devices (CAM, YS), pp. 417–426.
- ICALP-v1-2014-PrabhakaranSW #using
- Secure Computation Using Leaky Tokens (MP, AS, AW), pp. 907–918.
- IFM-2014-BruniSNN #analysis #protocol #security
- Formal Security Analysis of the MaCAN Protocol (AB, MS, FN, HRN), pp. 241–255.
- IFM-2014-KordyPS #framework #probability #security
- A Probabilistic Framework for Security Scenarios with Dependent Actions (BK, MP, PS), pp. 256–271.
- IFM-2014-RamsdellDGR #analysis #hybrid #protocol #security
- A Hybrid Analysis for Security Protocols with State (JDR, DJD, JDG, PDR), pp. 272–287.
- ICFP-2014-Fisher #formal method #using
- Using formal methods to enable more secure vehicles: DARPA’s HACMS program (KF), p. 1.
- CHI-2014-ChowdhuryPM #authentication #named
- Passhint: memorable and secure authentication (SC, RP, LM), pp. 2917–2926.
- CHI-2014-HarbachHWS #communication #privacy #security #using
- Using personal examples to improve risk communication for security & privacy decisions (MH, MH, SW, MS), pp. 2647–2656.
- CHI-2014-ShayKDHMSUBCC #question
- Can long passwords be secure and usable? (RS, SK, ALD, P(H, MLM, SMS, BU, LB, NC, LFC), pp. 2927–2936.
- CHI-2014-VanieaRW #case study #experience #how #security
- Betrayed by updates: how negative experiences affect future security (KV, EJR, RW), pp. 2671–2674.
- CHI-2014-ZhangWKGS #mobile #security #towards
- Effects of security warnings and instant gratification cues on attitudes toward mobile websites (BZ, MW, HK, EG, SSS), pp. 111–114.
- CSCW-2014-XiaoWM #development #security #social #tool support #why
- Social influences on secure development tool adoption: why security tools spread (SX, JW, ERMH), pp. 1095–1106.
- DUXU-DP-2014-GokturkS #approach #development #interface
- A Perception Oriented Approach for Usable and Secure Interface Development (MG, IS), pp. 23–31.
- DUXU-TMT-2014-CoventryBJM #behaviour #named #security
- SCENE: A Structured Means for Creating and Evaluating Behavioral Nudges in a Cyber Security Environment (LMC, PB, DJ, APAvM), pp. 229–239.
- LCT-NLE-2014-LaugassonK #open source #security
- File Formats Security — Proprietary vs. Open-Source (EL, KK), pp. 63–72.
- CAiSE-2014-LiH #approach #requirements #security
- Dealing with Security Requirements for Socio-Technical Systems: A Holistic Approach (TL, JH), pp. 285–300.
- EDOC-2014-KormanSHBE #assessment #bibliography #enterprise #risk management #security
- Overview of Enterprise Information Needs in Information Security Risk Assessment (MK, TS, JH, JEB, ME), pp. 42–51.
- ICPR-2014-KumarK #adaptation #multimodal #recognition #security #set #using
- Adaptive Security for Human Surveillance Using Multimodal Open Set Biometric Recognition (AK, AK), pp. 405–410.
- ICPR-2014-LetchfordGZ #security
- Smoothing Security Prices (AL, JG, LZ), pp. 1037–1042.
- KDD-2014-Waltzman #security
- Information environment security (RW), p. 1521.
- KDD-2014-ZhuXGC #mobile #privacy #recommendation #security
- Mobile app recommendations with security and privacy awareness (HZ, HX, YG, EC), pp. 951–960.
- KDIR-2014-KurasEAH #data mining #mining #security
- The GDR Through the Eyes of the Stasi — Data Mining on the Secret Reports of the State Security Service of the former German Democratic Republic (CK, TE, CA, GH), pp. 360–365.
- KEOD-2014-KruppS0 #mobile #ontology #policy #privacy #security
- An Ontology for Enforcing Security and Privacy Policies on Mobile Devices (BK, NS, WZ), pp. 288–295.
- KMIS-2014-DaviesB #security
- Determining the Value of Information Security Investments — A Decision Support System (HLD, AJCB), pp. 426–433.
- SEKE-2014-BakerS #architecture #aspect-oriented #implementation
- Aspect-Oriented Secure Connectors for Implementation of Secure Software Architecture (CB, MS), pp. 187–192.
- SEKE-2014-El-KharboutlyGF #analysis #security
- Industry-wise Analysis of Security Breaches in Data Loss Incidents (REK, SSG, LF), pp. 615–619.
- SEKE-2014-SantosRBC #elicitation #requirements #security
- Persona Security: A Technique for Supporting the Elicitation of Security Requirements (MADS, JR, RdSB, TC), pp. 603–608.
- SIGIR-2014-SiY #information retrieval #privacy #security
- Privacy-preserving IR: when information retrieval meets privacy and security (LS, HY), p. 1295.
- PLATEAU-2014-KurilovaPA #design #named #programming language #security
- Wyvern: Impacting Software Security via Programming Language Design (DK, AP, JA), pp. 57–58.
- POPL-2014-SwamyFRBCSB #embedded #javascript #type system
- Gradual typing embedded securely in JavaScript (NS, CF, AR, KB, JC, PYS, GMB), pp. 425–438.
- RE-2014-Anton #privacy #security
- Now more than ever: Privacy and security are required (keynote) (AIA), p. 2.
- RE-2014-GartnerRBSJ #maintenance #requirements #security
- Maintaining requirements for long-living software systems by incorporating security knowledge (SG, TR, JB, KS, JJ), pp. 103–112.
- RE-2014-Ionita #evaluation #identification #information management #risk management #security
- Context-sensitive Information security Risk identification and evaluation techniques (DI), pp. 485–488.
- RE-2014-RiazKSW #automation #identification #natural language #requirements #security
- Hidden in plain sight: Automatically identifying security requirements from natural language artifacts (MR, JTK, JS, LAW), pp. 183–192.
- RE-2014-SlavinLNB #diagrams #feature model #requirements #security #using
- Managing security requirements patterns using feature diagram hierarchies (RS, JML, JN, TDB), pp. 193–202.
- RE-2014-TsigkanosPMGN #adaptation #requirements #runtime #security
- Engineering topology aware adaptive security: Preventing requirements violations at runtime (CT, LP, CM, CG, BN), pp. 203–212.
- SAC-2014-BeckersCG #in the cloud #requirements #security
- A catalog of security requirements patterns for the domain of cloud computing systems (KB, IC, LG), pp. 337–342.
- SAC-2014-EmuraKOT #communication #formal method #implementation #prototype
- Building secure and anonymous communication channel: formal model and its prototype implementation (KE, AK, SO, TT), pp. 1641–1648.
- SAC-2014-OliveiraNWB #approach #kernel #named
- Ianus: secure and holistic coexistence with kernel extensions — a immune system-inspired approach (DO, JN, NW, MB), pp. 1672–1679.
- SAC-2014-ShoshitaishviliIDV #analysis #scalability #security #trade-off
- Do you feel lucky?: a large-scale analysis of risk-rewards trade-offs in cyber security (YS, LI, AD, GV), pp. 1649–1656.
- SAC-2014-TesfayHBO #architecture #communication #network
- Cyber-secure communication architecture for active power distribution networks (TTT, JPH, JYLB, PO), pp. 545–552.
- SAC-2014-TupakulaV #monitoring
- Secure monitoring for dementia patients (UKT, VV), pp. 14–19.
- SAC-2014-YokoyamaKM #using
- Secure positioning in a UAV swarm using on-board stereo cameras (RSY, BYLK, EdSM), pp. 769–774.
- ASPLOS-2014-0001KOTRKSHC #named #policy #security
- Sapper: a language for hardware-level security policy enforcement (XL, VK, JKO, MT, VRR, RK, TS, BH, FTC), pp. 97–112.
- CC-2014-FranzHKSV #c #compilation #named
- CBMC-GC: An ANSI C Compiler for Secure Two-Party Computations (MF, AH, SK, CS, HV), pp. 244–249.
- CGO-2014-KashyapH #security
- Security Signature Inference for JavaScript-based Browser Addons (VK, BH), p. 219.
- OSDI-2014-HawblitzelHLNPZZ #automation #security #verification
- Ironclad Apps: End-to-End Security via Automated Full-System Verification (CH, JH, JRL, AN, BP, DZ, BZ), pp. 165–181.
- OSDI-2014-MooreDKC #named #scripting language
- SHILL: A Secure Shell Scripting Language (SM, CD, DK, SC), pp. 183–199.
- ICST-2014-PotetMPD #approach #control flow #evaluation #injection #named #robust
- Lazart: A Symbolic Approach for Evaluation the Robustness of Secured Codes against Control Flow Injections (MLP, LM, MP, LD), pp. 213–222.
- ICTSS-2014-WotawaB #automation #exclamation #security #testing
- Plan It! Automated Security Testing Based on Planning (FW, JB), pp. 48–62.
- ISSTA-2014-TrippFP #analysis #hybrid #javascript #partial evaluation #security #web
- Hybrid security analysis of web JavaScript code via dynamic partial evaluation (OT, PF, MP), pp. 49–59.
- LICS-CSL-2014-BruyereMR #game studies
- Secure equilibria in weighted games (VB, NM, JFR), p. 26.
- CASE-2013-ZhangPJST #energy #interface #monitoring #scalability #using
- A secure and scalable telemonitoring system using ultra-low-energy wireless sensor interface for long-term monitoring in life science applications (WZ, PP, EJ, RS, KT), pp. 617–622.
- DAC-2013-FanRRV #design #encryption #energy #security
- Low-energy encryption for medical devices: security adds an extra design dimension (JF, OR, VR, IV), p. 6.
- DAC-2013-RostamiBKJ #question #security
- Balancing security and utility in medical devices? (MR, WB, FK, AJ), p. 6.
- DAC-2013-WangYRNZMMB #design #grid #power management
- Role of power grid in side channel attack and power-grid-aware secure design (XW, WY, DBR, SN, YZ, SM, DM, SB), p. 9.
- DAC-2013-YinQ #security
- Improving PUF security with regression-based distiller (CEDY, GQ), p. 6.
- DATE-2013-DiazSSR #analysis #network #performance #security #simulation
- Wireless sensor network simulation for security and performance analysis (AD, PS, JS, JR), pp. 432–435.
- DATE-2013-JiangEP #embedded #optimisation #set
- Optimization of secure embedded systems with dynamic task sets (KJ, PE, ZP), pp. 1765–1770.
- DATE-2013-LeestT #hardware #security
- Anti-counterfeiting with hardware intrinsic security (VvdL, PT), pp. 1137–1142.
- DATE-2013-RajendranSK #question
- Is split manufacturing secure? (JR, OS, RK), pp. 1259–1264.
- DATE-2013-SagstetterLSWBHJPPC #architecture #challenge #design #hardware #security
- Security challenges in automotive hardware/software architecture design (FS, ML, SS, MW, AB, WRH, SJ, TP, AP, SC), pp. 458–463.
- SIGMOD-2013-ArasuBEJKKRUV #as a service
- Secure database-as-a-service with Cipherbase (AA, SB, KE, MJ, RK, DK, RR, PU, RV), pp. 1033–1036.
- VLDB-2013-Kozak #performance #security #similarity
- Efficiency and Security in Similarity Cloud Services (SK), pp. 1450–1455.
- ITiCSE-2013-PatitsasL #security
- Dr. Horrible’s fork bomb: a lab for introducing security issues in CS2 (EAP, DL), p. 318.
- ITiCSE-2013-QianYGBT #authentication #learning #mobile #network #security
- Mobile device based authentic learning for computer network and security (KQ, MY, MG, PB, LT), p. 335.
- FASE-2013-TrippPCCG #analysis #named #scalability #security #web
- Andromeda: Accurate and Scalable Security Analysis of Web Applications (OT, MP, PC, RC, SG), pp. 210–225.
- CSMR-2013-BergerSK #architecture #security
- Extracting and Analyzing the Implemented Security Architecture of Business Applications (BJB, KS, RK), pp. 285–294.
- PEPM-2013-WeijersHH #fault #higher-order #polymorphism #security
- Security type error diagnosis for higher-order, polymorphic languages (JW, JH, SH), pp. 3–12.
- PLDI-2013-Schneider #programming language #security
- Programming languages in security: keynote (FBS), pp. 139–140.
- STOC-2013-ChungPS #security #simulation
- Non-black-box simulation from one-way functions and applications to resettable security (KMC, RP, KS), pp. 231–240.
- ICALP-v2-2013-ChretienCD #automaton #protocol #security
- From Security Protocols to Pushdown Automata (RC, VC, SD), pp. 137–149.
- ICALP-v2-2013-LipmaaT #complexity #online #similarity #sublinear #testing
- Secure Equality and Greater-Than Tests with Sublinear Online Complexity (HL, TT), pp. 645–656.
- IFM-2013-VigoNN #communication
- Broadcast, Denial-of-Service, and Secure Communication (RV, FN, HRN), pp. 412–427.
- SEFM-2013-BorekMSR #approach #model checking #modelling
- Model Checking of Security-Critical Applications in a Model-Driven Approach (MB, NM, KS, WR), pp. 76–90.
- IFL-2013-FowlerB #dependent type #programming #web
- Dependent Types for Safe and Secure Web Programming (SF, EB), p. 49.
- CHI-2013-LucaZPH #using
- Using fake cursors to secure on-screen password entry (ADL, EvZ, LP, HH), pp. 2399–2402.
- CHI-2013-ThiemeWJMLWOM #design #women
- Design to promote mindfulness practice and sense of self for vulnerable women in secure hospital services (AT, JW, PJ, JCM, SEL, PCW, PO, TDM), pp. 2647–2656.
- DUXU-NTE-2013-Langhorne #evaluation #online #security
- Department of Homeland Security Websites Uncoupled: An Evaluation of Online Counterterrorism and Security Information across Agencies (ALL), pp. 112–119.
- HCI-UC-2013-Acharya #named #privacy
- SP-CIP: A Secure and Privacy Aware Patient Centric Information Portal (SA), pp. 3–9.
- HIMI-D-2013-LiaoLH #concept #modelling #ontology #perspective #security #towards
- Towards an Ontological Interpretation on the i* Modeling Language Extended with Security Concepts: A Bunge-Wand-Weber Model Perspective (GYL, PJL, LTH), pp. 322–328.
- HIMI-HSM-2013-MoodyW #mobile #security #what
- Security, But at What Cost? — An Examination of Security Notifications within a Mobile Application (GM, DW), pp. 391–399.
- OCSC-2013-KaratasBK #security #towards #visual notation
- Towards Visual Configuration Support for Interdependent Security Goals (FK, MB, DK), pp. 375–384.
- AdaEurope-2013-FaginC #case study #reliability
- Provably Secure DNS: A Case Study in Reliable Software (BSF, MCC), pp. 81–93.
- CAiSE-2013-BarhamgiBOCCMT #execution #privacy
- Secure and Privacy-Preserving Execution Model for Data Services (MB, DB, SO, NCB, FC, MM, HT), pp. 35–50.
- ICEIS-J-2013-SuB13a #fine-grained #graph #identification #security
- Foundation for Fine-Grained Security and DRM Control Based on a Service Call Graph Context Identification (ZS, FB), pp. 226–241.
- ICEIS-v2-2013-DelgadoORHG #information management #security #social
- Proposal of an Interoperability Model for Social Security Information Systems (FDA, SO, RJR, JRH, JMG), pp. 451–458.
- ICEIS-v3-2013-NassarBBB #architecture #design #security #towards
- Towards Security Awareness in Designing Service-oriented Architectures (PBN, YB, FB, KB), pp. 347–355.
- KDD-2013-Marty #how #security #visual notation
- Cyber security: how visual analytics unlock insight (RM), p. 1139.
- KDIR-KMIS-2013-CostaS #assessment #concept #enterprise #security #using
- Enterprise to Cloud Security Assessment — A Method using OSSTMM 3.0 Concepts (RC, CS), pp. 571–578.
- KDIR-KMIS-2013-Hugl #challenge #security
- Crying for the Moon? — Current Challenges in Corporate Information Security Management (UH), pp. 579–586.
- SEKE-2013-AlshammariFC #bytecode #java #metric #security #source code
- Security Metrics for Java Bytecode Programs (S) (BA, CJF, DC), pp. 394–399.
- MoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
- MoDELS-2013-PerezGCCC #analysis #modelling #network #policy #security
- Model-Driven Extraction and Analysis of Network Security Policies (SMP, JGA, FC, NCB, JC), pp. 52–68.
- Onward-2013-ValleeWZFK #modelling #problem #reasoning #security
- Usable security as a static-analysis problem: modeling and reasoning about user permissions in social-sharing systems (HQdlV, JMW, WZ, KF, SK), pp. 1–16.
- OOPSLA-2013-TetaliLMM #named #static analysis
- MrCrypt: static analysis for secure cloud computations (SDT, ML, RM, TDM), pp. 271–286.
- QAPL-2013-NgoH #analysis #concurrent #multi #security #source code #thread
- Quantitative Security Analysis for Multi-threaded Programs (TMN, MH), pp. 34–48.
- POPL-2013-LivshitsC #automation #classification #security #towards
- Towards fully automatic placement of security sanitizers and declassifiers (BL, SC), pp. 385–398.
- SAC-2013-AccorsiSM #mining #on the #process #security
- On the exploitation of process mining for security audits: the process discovery case (RA, TS, GM), pp. 1462–1468.
- SAC-2013-ArmandoCM
- Bring your own device, securely (AA, GC, AM), pp. 1852–1858.
- SAC-2013-CampioloSBG #security #twitter
- Evaluating the utilization of Twitter messages as a source of security alerts (RC, LAFS, DMB, MAG), pp. 942–943.
- SAC-2013-CarlosMPC #security
- An updated threat model for security ceremonies (MCC, JEM, GP, RFC), pp. 1836–1843.
- SAC-2013-EgnersM #framework #multi
- Secure roaming and infrastructure sharing for multi-operator WMNs (AE, UM), pp. 1800–1807.
- SAC-2013-HunnyZW #adaptation #named
- OSDC: adapting ODC for developing more secure software (UH, MZ, KW), pp. 1131–1136.
- SAC-2013-JeonKKC #android #security
- Enhancing security enforcement on unmodified Android (CJ, WK, BK, YC), pp. 1655–1656.
- SAC-2013-KaratasK #approach #composition #flexibility #security
- A flexible approach for considering interdependent security objectives in service composition (FK, DK), pp. 1919–1926.
- SAC-2013-MartinaP #induction #multi #protocol #security #using #verification
- Verifying multicast-based security protocols using the inductive method (JEM, LCP), pp. 1824–1829.
- SAC-2013-ShinYR #android #security #visual notation
- Supporting visual security cues for WebView-based Android apps (DS, HY, UR), pp. 1867–1876.
- SAC-2013-TranLZ #architecture #metadata #security
- Derivation of domain-specific architectural knowledge views from governance and security compliance metadata (HT, IL, UZ), pp. 1728–1733.
- SAC-2013-VukovicD #distributed #estimation #on the #security
- On the security of distributed power system state estimation under targeted attacks (OV, GD), pp. 666–672.
- ICSE-2013-AlmorsyGI #analysis #architecture #automation #security #using
- Automated software architecture security risk analysis using formalized signatures (MA, JG, ASI), pp. 662–671.
- ICSE-2013-Rimba #assurance #security #using
- Building high assurance secure applications using security patterns for capability-based platforms (PR), pp. 1401–1404.
- ASPLOS-2013-HofmannKDLW #named #operating system
- InkTag: secure applications on an untrusted operating system (OSH, SK, AMD, MZL, EW), pp. 265–278.
- ASPLOS-2013-MaiPXKM #invariant #security #verification
- Verifying security invariants in ExpressOS (HM, EP, HX, STK, PM), pp. 293–304.
- CGO-2013-ArthurMRAB #debugging #named #profiling #scalability #security
- Schnauzer: scalable profiling for likely security bug sites (WA, BM, RR, TMA, VB), p. 11.
- CGO-2013-RodriguesCP #integer #performance #source code
- A fast and low-overhead technique to secure programs against integer overflows (RER, VHSC, FMQP), p. 11.
- CAV-2013-BiondiLTW #imperative #named #security
- QUAIL: A Quantitative Security Analyzer for Imperative Code (FB, AL, LMT, AW), pp. 702–707.
- CAV-2013-MeierSCB #analysis #protocol #proving #security
- The TAMARIN Prover for the Symbolic Analysis of Security Protocols (SM, BS, CC, DAB), pp. 696–701.
- CAV-2013-SosnovichGN #network #protocol #security #using
- Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems (AS, OG, GN), pp. 724–739.
- ICST-2013-Buchler #security #testing
- Security Testing with Fault-Models and Properties (MB), pp. 501–502.
- ICST-2013-CompagnaGB #as a service #process #security #validation
- Business Process Compliance via Security Validation as a Service (LC, PG, ADB), pp. 455–462.
- ICST-2013-MunetohY #agile #development #framework #named #security #testing
- RAILROADMAP: An Agile Security Testing Framework for Web-application Development (SM, NY), pp. 491–492.
- ICST-2013-Vigano #internet
- The SPaCIoS Project: Secure Provision and Consumption in the Internet of Services (LV), pp. 497–498.
- ICTSS-2013-PellegrinoCM #developer #protocol #security
- A Tool for Supporting Developers in Analyzing the Security of Web-Based Security Protocols (GP, LC, TM), pp. 277–282.
- ISSTA-2013-TrippWG #approach #learning #security #testing #web
- Finding your way in the testing jungle: a learning approach to web security testing (OT, OW, LG), pp. 347–357.
- LICS-2013-Comon-Lundh #logic #modelling #named #problem #security
- LICS: Logic in Computer Security — Some Attacker’s Models and Related Decision Problems (HCL), p. 1.
- LICS-2013-Halpern #first-order #logic #proving #security #using
- From Qualitative to Quantitative Proofs of Security Properties Using First-Order Conditional Logic (JYH), pp. 2–3.
- CBSE-2012-AnneAVP #composition #named
- Jasmin: an alternative for secure modularity inside the digital home (MA, KA, DHdV, JP), pp. 145–150.
- WICSA-ECSA-2012-Al-AzzaniB #architecture #evaluation #named #security #testing
- SecArch: Architecture-level Evaluation and Testing for Security (SAA, RB), pp. 51–60.
- WICSA-ECSA-2012-HeymanSJ #architecture #formal method #modelling #reuse
- Reusable Formal Models for Secure Software Architectures (TH, RS, WJ), pp. 41–50.
- ASE-2012-BartelKTM #android #automation
- Automatically securing permission-based software by reducing the attack surface: an application to Android (AB, JK, YLT, MM), pp. 274–277.
- ASE-2012-HwangXKMT #evolution #policy #security #testing
- Selection of regression system tests for security policy evolution (JH, TX, DEK, TM, YLT), pp. 266–269.
- DAC-2012-BurlesonCRF #challenge #design
- Design challenges for secure implantable medical devices (WB, SSC, BR, KF), pp. 12–17.
- DAC-2012-KoushanfarSS #challenge
- EDA for secure and dependable cybercars: challenges and opportunities (FK, ARS, HS), pp. 220–228.
- DAC-2012-RajendranPSK #analysis #logic #obfuscation #security
- Security analysis of logic obfuscation (JR, YP, OS, RK), pp. 83–89.
- DATE-2012-BeaumontHN #architecture #execution #hardware #replication #security #using
- SAFER PATH: Security architecture using fragmented execution and replication for protection against trojaned hardware (MRB, BDH, TN), pp. 1000–1005.
- DATE-2012-DasKSV #design #encryption #testing
- PUF-based secure test wrapper design for cryptographic SoC testing (AD, ÜK, ARS, IV), pp. 866–869.
- DATE-2012-JiangEP #co-evolution #communication #constraints #design #distributed #embedded #realtime #security
- Co-design techniques for distributed real-time embedded systems with communication security constraints (KJ, PE, ZP), pp. 947–952.
- DATE-2012-NassarSGD #named #performance
- RSM: A small and fast countermeasure for AES, secure against 1st and 2nd-order zero-offset SCAs (MN, YS, SG, JLD), pp. 1173–1178.
- VLDB-2012-AgrawalAW #in the cloud #perspective #privacy
- Secure and Privacy-Preserving Data Services in the Cloud: A Data Centric View (DA, AEA, SW), pp. 2028–2029.
- ITiCSE-2012-BrownCDGHMNPPSSSSS #education
- Anatomy, dissection, and mechanics of an introductory cyber-security course’s curriculum at the United States naval academy (CB, FC, RD, RG, CH, JM, DN, AP, AP, SS, JS, SS, DS, SS), pp. 303–308.
- TACAS-2012-ArmandoAABCCCCCCEFMMOPPRRDTV #architecture #automation #framework #security #trust #validation
- The AVANTSSAR Platform for the Automated Validation of Trust and Security of Service-Oriented Architectures (AA, WA, TA, MB, AC, AC, RC, YC, LC, JC, GE, SF, MM, SM, DvO, GP, SEP, MR, MR, MTD, MT, LV), pp. 267–282.
- STOC-2012-BoyleGJK #memory management #multi
- Multiparty computation secure against continual memory leakage (EB, SG, AJ, YTK), pp. 1235–1254.
- STOC-2012-VaziraniV #generative #quantum #random
- Certifiable quantum dice: or, true random number generation secure against quantum adversaries (UVV, TV), pp. 61–76.
- FM-2012-Abadi #formal method #security
- Software Security: A Formal Perspective — (Notes for a Talk) (MA), pp. 1–5.
- SEFM-2012-BistarelliS #concurrent #constraints #programming
- Securely Accessing Shared Resources with Concurrent Constraint Programming (SB, FS), pp. 308–322.
- SEFM-2012-VorobyovKS #approach #data flow #security
- A Low-Overhead, Value-Tracking Approach to Information Flow Security (KV, PK, PS), pp. 367–381.
- ICFP-2012-LaunchburyDDA #multi #performance #protocol
- Efficient lookup-table protocol in secure multiparty computation (JL, ISD, TD, AAM), pp. 189–200.
- CHI-2012-BullingAS #security #using #visual notation
- Increasing the security of gaze-based cued-recall graphical passwords using saliency masks (AB, FA, AS), pp. 3011–3020.
- CHI-2012-XieLC #interactive #programming
- Evaluating interactive support for secure programming (JX, HRL, BtC), pp. 2707–2716.
- CSCW-2012-ChiaC #security #web
- Community-based web security: complementary roles of the serious and casual contributors (PHC, JC), pp. 1023–1032.
- HILT-2012-HardinSWP #domain-specific language #security
- A DSL for cross-domain security (DSH, KS, MWW, THP), pp. 53–62.
- ICPR-2012-MaLWZH #authentication #multimodal #security
- Enhancing biometric security with wavelet quantization watermarking based two-stage multimodal authentication (BM, CL, YW, ZZ, DH), pp. 2416–2419.
- KDIR-2012-Martiny #security
- Unsupervised Discovery of Significant Candlestick Patterns for Forecasting Security Price Movements (KM), pp. 145–150.
- KEOD-2012-PereiraS #approach #design #information management #ontology #security
- An Ontology Approach in Designing Security Information Systems to Support Organizational Security Risk Knowledge (TSMP, HMDS), pp. 461–466.
- SEKE-2012-ChenL #approach #behaviour #elicitation #ontology #requirements #security
- Eliciting Security Requirements in the Commanded Behavior Frame: An Ontology based Approach (XC, JL), pp. 61–65.
- SEKE-2012-FitchX #fault tolerance #petri net
- A Petri Net Model for Secure and Fault-Tolerant Cloud-Based Information Storage (DFF, HX), pp. 333–339.
- SEKE-2012-MaarabaniAC #policy #security #testing
- Testing Interoperability Security Policies (MEM, CA, ARC), pp. 464–469.
- SEKE-2012-ShinMGK #architecture
- Connectors for Secure Software Architectures (MES, BM, HG, TK), pp. 394–399.
- Onward-2012-HafizAJ #pattern matching #security
- Growing a pattern language (for security) (MH, PA, REJ), pp. 139–158.
- OOPSLA-2012-MullerC #concurrent #towards
- Towards a practical secure concurrent language (SM, SC), pp. 57–74.
- RE-2012-PajaDPRG #named #requirements #security #social
- STS-tool: Socio-technical Security Requirements through social commitments (EP, FD, MP, PR, PG), pp. 331–332.
- RE-2012-SalehiePOAN #adaptation #runtime #security
- Requirements-driven adaptive security: Protecting variable assets at runtime (MS, LP, IO, RA, BN), pp. 111–120.
- RE-2012-TawhidBCAMSABR #security #towards
- Towards outcome-based regulatory compliance in aviation security (RT, EB, NC, MA, GM, AS, DA, SAB, GR), pp. 267–272.
- REFSQ-2012-ChowdhuryMSK #diagrams #requirements #risk management #security
- Aligning Mal-activity Diagrams and Security Risk Management for Security Requirements Definitions (MJMC, RM, GS, PK), pp. 132–139.
- SAC-2012-AccorsiS #consistency #mining #on the #process #security
- On the exploitation of process mining for security audits: the conformance checking case (RA, TS), pp. 1709–1716.
- SAC-2012-BalduzziZBKL #analysis #security
- A security analysis of amazon’s elastic compute cloud service (MB, JZ, DB, EK, SL), pp. 1427–1434.
- SAC-2012-BeusterG #modelling #policy #security #smarttech
- Formal security policy models for smart card evaluations (GB, KG), pp. 1640–1642.
- SAC-2012-BistarelliCS #concurrent #constraints #coordination #programming
- A secure coordination of agents with nonmonotonic soft Concurrent Constraint Programming (SB, PC, FS), pp. 1551–1553.
- SAC-2012-MonakovaBS #process #safety #security
- Security and safety of assets in business processes (GM, ADB, AS), pp. 1667–1673.
- SAC-2012-RodoperBJT #framework #mobile #performance #security
- An efficient security framework for mobile WiMAX (MR, AB, EJ, WT), pp. 1494–1501.
- FSE-2012-PasqualeMSCON #adaptation #named #security
- SecuriTAS: a tool for engineering adaptive security (LP, CM, MS, LC, IO, BN), p. 19.
- FSE-2012-XiaoPTX #automation #documentation #policy #security
- Automated extraction of security policies from natural-language software documents (XX, AMP, ST, TX), p. 12.
- ICSE-2012-Avancini #research #security #testing #web
- Security testing of web applications: A research plan (AA), pp. 1491–1494.
- ICSE-2012-Rodes #layout #source code #stack #towards
- Stack layout transformation: Towards diversity for securing binary programs (BR), pp. 1543–1546.
- ICSE-2012-YskoutSJ #architecture #question #security
- Does organizing security patterns focus architectural choices? (KY, RS, WJ), pp. 617–627.
- ASPLOS-2012-SzeferL #architecture
- Architectural support for hypervisor-secure virtualization (JS, RBL), pp. 437–450.
- OSDI-2012-KotlaRRSW #data access #hardware #named #using
- Pasture: Secure Offline Data Access Using Commodity Trusted Hardware (RK, TR, IR, PS, BW), pp. 321–334.
- OSDI-2012-WangCJZK #integer #security
- Improving Integer Security for Systems with KINT (XW, HC, ZJ, NZ, MFK), pp. 163–177.
- CAV-2012-HarrisJR #automaton #game studies #programming #safety
- Secure Programming via Visibly Pushdown Safety Games (WRH, SJ, TWR), pp. 581–598.
- ICST-2012-ChoudharyDBJOI #challenge #internet #modelling #security #testing
- Solving Some Modeling Challenges when Testing Rich Internet Applications for Security (SC, MED, GvB, GVJ, IVO, PI), pp. 850–857.
- ICST-2012-Kannavara #source code #static analysis
- Securing Opensource Code via Static Analysis (RK), pp. 429–436.
- ICST-2012-WehbiOB #monitoring #security #using
- Events-Based Security Monitoring Using MMT Tool (BW, EMdO, MB), pp. 860–863.
- IJCAR-2012-DelauneKP #constraints #protocol #security
- Security Protocols, Constraint Systems, and Group Theories (SD, SK, DP), pp. 164–178.
- TAP-2012-ArmandoPCMB #automation #model checking #protocol #security #testing
- From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap (AA, GP, RC, AM, DB), pp. 3–18.
- QoSA-ISARCS-2011-ArissX #modelling #security
- Modeling security attacks with statecharts (OeA, DX), pp. 123–132.
- QoSA-ISARCS-2011-KhanZ #component #embedded #monitoring #security
- Building components with embedded security monitors (MUAK, MZ), pp. 133–142.
- WICSA-2011-FaniyiBEK #architecture #predict #security
- Evaluating Security Properties of Architectures in Unpredictable Environments: A Case for Cloud (FF, RB, AE, RK), pp. 127–136.
- DAC-2011-Kocher #challenge #complexity
- Complexity and the challenges of securing SoCs (PK), pp. 328–331.
- DAC-2011-WeiP #security #using
- Integrated circuit security techniques using variable supply voltage (SW, MP), pp. 248–253.
- DATE-2011-AliCMB #encryption #hardware #multi #security
- Multi-level attacks: An emerging security concern for cryptographic hardware (SA, RSC, DM, SB), pp. 1176–1179.
- DATE-2011-PorquetGS #architecture #flexibility #memory management #named
- NoC-MPU: A secure architecture for flexible co-hosting on shared memory MPSoCs (JP, AG, CS), pp. 591–594.
- DATE-2011-SreedharK11a #security
- Physically unclonable functions for embeded security based on lithographic variation (AS, SK), pp. 1632–1637.
- DocEng-2011-BalinskyS #documentation
- Secure document engineering (HB, SJS), pp. 269–272.
- CSEET-2011-ChookittikulM #collaboration #effectiveness #security
- Effective real-world project collaboration: Strategies from a cyber security degree program (WC, PEM), pp. 429–433.
- ITiCSE-2011-GuimaraesSA #education #game studies #security #using #video
- Using video games to teach security (MAMG, HES, RA), p. 346.
- ITiCSE-2011-TaylorK #injection #security #student
- Security injections: modules to help students remember, understand, and apply secure coding techniques (BT, SK), pp. 3–7.
- ESOP-2011-FournetP #compilation #data flow #security
- Compiling Information-Flow Security to Minimal Trusted Computing Bases (CF, JP), pp. 216–235.
- ESOP-2011-HuntS #exponential #polynomial #security #type system
- From Exponential to Polynomial-Time Security Typing via Principal Types (SH, DS), pp. 297–316.
- ESOP-2011-JensenKP #policy
- Secure the Clones — Static Enforcement of Policies for Secure Object Copying (TPJ, FK, DP), pp. 317–337.
- FASE-2011-HateburHJS #design #development #modelling #requirements #security
- Systematic Development of UMLsec Design Models Based on Security Requirements (DH, MH, JJ, HS), pp. 232–246.
- MSR-2011-ZamanAH #case study #debugging #performance #security
- Security versus performance bugs: a case study on Firefox (SZ, BA, AEH), pp. 93–102.
- SCAM-2011-AvanciniC #approach #search-based #security #testing #web
- Security Testing of Web Applications: A Search-Based Approach for Cross-Site Scripting Vulnerabilities (AA, MC), pp. 85–94.
- WCRE-2011-BergerBS #android #case study #security
- An Android Security Case Study with Bauhaus (BJB, MB, KS), pp. 179–183.
- WCRE-2011-TreudeFSS #case study #reverse engineering #security
- An Exploratory Study of Software Reverse Engineering in a Security Context (CT, FMFF, MADS, MS), pp. 184–188.
- PLDI-2011-LiTOKCSH #data flow #hardware #named
- Caisson: a hardware description language for secure information flow (XL, MT, JO, VK, FTC, TS, BH), pp. 109–120.
- PLDI-2011-SrivastavaBMS #api #detection #implementation #multi #policy #security #using
- A security policy oracle: detecting security holes using multiple API implementations (VS, MDB, KSM, VS), pp. 343–354.
- SAS-2011-Mitchell #program analysis #security #web
- Program Analysis for Web Security (JCM), p. 4.
- STOC-2011-Ajtai
- Secure computation with information leaking to an adversary (MA), pp. 715–724.
- STOC-2011-Pass #security #standard
- Limits of provable security from standard assumptions (RP), pp. 109–118.
- ICALP-v2-2011-LibertY #adaptation
- Adaptively Secure Non-interactive Threshold Cryptosystems (BL, MY), pp. 588–600.
- SFM-2011-CostaIMMS #security #trust
- Security and Trust (GC, VI, FM, IM, RS), pp. 393–416.
- SFM-2011-JurjensOSMHI #evolution #modelling #specification
- Modelling Secure Systems Evolution: Abstract and Concrete Change Specifications (JJ, MO, HS, LM, SHH, SI), pp. 504–526.
- ICFP-2011-SwamyCFSBY #dependent type #distributed #programming
- Secure distributed programming with value-dependent types (NS, JC, CF, PYS, KB, JY), pp. 266–278.
- CHI-2011-AyyavuJ #feedback #heuristic #privacy #security
- Integrating user feedback with heuristic security and privacy management systems (PA, CJ), pp. 2305–2314.
- CHI-2011-HayashiHC #authentication #security #visual notation
- Security through a different kind of obscurity: evaluating distortion in graphical authentication schemes (EH, JIH, NC), pp. 2055–2064.
- CHI-2011-LucaFMSHKH #internet #security #visualisation
- Does MoodyBoard make internet use more secure?: evaluating an ambient security visualization tool (ADL, BF, MEM, JS, DH, NK, HH), pp. 887–890.
- CHI-2011-MathiasenB #design #interactive #security
- Experiencing security in interaction design (NRM, SB), pp. 2325–2334.
- HCD-2011-Yamane #authentication #case study #design #game studies #multi #online
- Secure Online Game Play with Token: A Case Study in the Design of Multi-factor Authentication Device (SRY), pp. 597–605.
- HIMI-v1-2011-JeonKLW #analysis #security #smarttech
- A Practical Analysis of Smartphone Security (WJ, JK, YL, DW), pp. 311–320.
- HIMI-v1-2011-Pavel11a #approach #composition #design #protocol #security
- An Approach for Security Protocol Design Based on Zero-Knowledge Primitives Composition (OP), pp. 374–378.
- CAiSE-2011-SchmidtJ #analysis #design #requirements #security #using
- Connecting Security Requirements Analysis and Secure Design Using Patterns and UMLsec (HS, JJ), pp. 367–382.
- ICEIS-v1-2011-WeiY #analysis #behaviour #game studies #metric #security
- Security Investment Analysis on Gaming Theory with Measurements of Cost and Decision Behavior (WW, RY), pp. 519–523.
- ICEIS-v2-2011-DingL #database #design #security
- Based on “Scenarios-response” Model of Security Plans for Emergency Management System of Database Design (DD, XL), pp. 210–212.
- ICEIS-v3-2011-JiangZC #case study #security
- Study on the Information Security System for Bank in China (XJ, ZZ, FC), pp. 190–195.
- ICEIS-v3-2011-ShenYZT #analysis #documentation #security
- Analysis of Core Documents in Information Security Based on Mapping Knowledge Domains (HZS, QJY, QJZ, LyT), pp. 421–427.
- ICEIS-v4-2011-ShailaVPTVP #named #network
- KCSR: Keymatches Constrained Secure Routing in Heterogeneous Wireless Sensor Networks (KS, GHV, CRP, VT, KRV, LMP), pp. 13–22.
- KDD-2011-GundechaBL #network #privacy #social
- Exploiting vulnerability to secure user privacy on a social networking site (PG, GB, HL), pp. 511–519.
- KDD-2011-McCue #security
- Operational security analytics: doing more with less (CM), p. 782.
- KEOD-2011-BoinskiOSK #integration #ontology #security
- Security Ontology Construction and Integration (TB, PO, JS, HK), pp. 369–374.
- KMIS-2011-SchwittekSEH #towards
- Towards a Common Body of Knowledge for Engineering Secure Software and Services (WS, HS, SE, MH), pp. 369–374.
- SEKE-2011-SanfordWX #analysis #modelling #security #using
- Security Analysis of FileZilla Server Using Threat Models (MS, DW, DX), pp. 678–682.
- SEKE-2011-WagnerFF #process #security #using
- Using Security Patterns to Tailor Software Process (RW, LMF, ABF), pp. 672–677.
- ECMFA-2011-JurjensMOS #evolution #incremental #modelling #security #verification
- Incremental Security Verification for Evolving UMLsec models (JJ, LM, MO, HS), pp. 52–68.
- OOPSLA-2011-SonMS #named #security #what
- RoleCast: finding missing security checks when you do not know what checks are (SS, KSM, VS), pp. 1069–1084.
- PPDP-2011-BourdierC #analysis #network #policy #security #term rewriting #using
- Symbolic analysis of network security policies using rewrite systems (TB, HC), pp. 77–88.
- RE-2011-FailyF #elicitation #requirements #security
- Eliciting usable security requirements with misusability cases (SF, IF), pp. 339–340.
- RE-2011-FranqueiraTYWN #security
- Risk and argument: A risk-based argumentation method for practical security (VNLF, TTT, YY, RW, BN), pp. 239–248.
- RE-2011-YuTTFN #named
- OpenArgue: Supporting argumentation to evolve secure software systems (YY, TTT, AT, VNLF, BN), pp. 351–352.
- REFSQ-2011-KnaussHSIJ #requirements #security
- Supporting Requirements Engineers in Recognising Security Issues (EK, SHH, KS, SI, JJ), pp. 4–18.
- SAC-2011-AdaikkalavanP #query
- Secure shared continuous query processing (RA, TP), pp. 1000–1005.
- SAC-2011-Blech #encryption #logic #proving #security
- Proving the security of ElGamal encryption via indistinguishability logic (JOB), pp. 1625–1632.
- SAC-2011-SohrMN #aspect-oriented #mobile #security
- Software security aspects of Java-based mobile phones (KS, TM, AN), pp. 1494–1501.
- SAC-2011-WoodraskaSX #mutation testing #security #testing
- Security mutation testing of the FileZilla FTP server (DW, MS, DX), pp. 1425–1430.
- SAC-2011-ZhuYXLYGQLCG #monitoring #named #security
- VASP: virtualization assisted security monitor for cross-platform protection (MZ, MY, MX, BL, PY, SG, ZQ, LL, YC, HG), pp. 554–559.
- ICSE-2011-Davies #reuse #security
- Measuring subversions: security and legal risk in reused software artifacts (JD), pp. 1149–1151.
- ICSE-2011-Jurjens #automation #evolution #modelling #security #uml
- Automated security hardening for evolving UML models (JJ), pp. 986–988.
- ICSE-2011-Smith #functional #requirements #security #testing #using
- Systematizing security test case planning using functional requirements phrases (BS), pp. 1136–1137.
- HPCA-2011-QureshiSLF #detection #online
- Practical and secure PCM systems by online detection of malicious write streams (MKQ, AS, LL, MF), pp. 478–489.
- SOSP-2011-ColpNZACDLW #security
- Breaking up is hard to do: security and functionality in a commodity hypervisor (PC, MN, JZ, WA, GC, TD, PL, AW), pp. 189–202.
- SOSP-2011-ZhouFNHLS #network
- Secure network provenance (WZ, QF, AN, AH, BTL, MS), pp. 295–310.
- CADE-2011-AlbertiAR #analysis #automation #named #policy #security
- ASASP: Automated Symbolic Analysis of Security Policies (FA, AA, SR), pp. 26–33.
- CADE-2011-ArnaudCD #protocol #recursion #security #testing
- Deciding Security for Protocols with Recursive Tests (MA, VC, SD), pp. 49–63.
- ICST-2011-DadeauHK #generative #protocol #security #testing
- Mutation-Based Test Generation from Security Protocols in HLPSL (FD, PCH, RK), pp. 240–248.
- ICST-2011-LetarteGM #evolution #php #security #web
- Security Model Evolution of PHP Web Applications (DL, FG, EM), pp. 289–298.
- ICST-2011-Zech #in the cloud #security #testing
- Risk-Based Security Testing in Cloud Computing Environments (PZ), pp. 411–414.
- TAP-2011-BuchlerOP #security #testing
- Security Mutants for Property-Based Testing (MB, JO, AP), pp. 69–77.
- ASE-2010-Abi-AntounB #architecture #security
- Analyzing security architectures (MAA, JMB), pp. 3–12.
- ASE-2010-MorinMFTBJ #adaptation #modelling
- Security-driven model-based dynamic adaptation (BM, TM, FF, YLT, OB, JMJ), pp. 205–214.
- DAC-2010-WeiMP #hardware #security
- Gate-level characterization: foundations and hardware security applications (SW, SM, MP), pp. 222–227.
- DATE-2010-Barker #aspect-oriented #network #security
- Security aspects in 6lowPan networks (RB), p. 660.
- DocEng-2010-SimskeSAE #documentation #ecosystem #forensics #security
- Document imaging security and forensics ecosystem considerations (SJS, MS, GBA, PE), pp. 41–50.
- DRR-2010-ChenL #on the #pseudo #security #usability
- On the usability and security of pseudo-signatures (JC, DPL), pp. 1–10.
- SIGMOD-2010-MarczakHBSLA #distributed #named
- SecureBlox: customizable secure distributed data processing (WRM, SSH, MB, MS, BTL, MA), pp. 723–734.
- VLDB-2010-AllardABGFNPRRY
- Secure Personal Data Servers: a Vision Paper (TA, NA, LB, YG, LLF, BN, PP, IR, IR, SY), pp. 25–35.
- ESOP-2010-KingJMJJS #automation #security
- Automating Security Mediation Placement (DK, SJ, DM, TJ, SJ, SAS), pp. 327–344.
- FoSSaCS-2010-CassezMZ #complexity #data flow #security
- The Complexity of Synchronous Notions of Information Flow Security (FC, RvdM, CZ), pp. 282–296.
- CSMR-2010-GarciaDFWGI #design #development #java #named #open source #reliability #web
- ROMULUS: Domain Driven Design and Mashup Oriented Development Based on Open Source Java Metaframework for Pragmatic, Reliable and Secure Web Development (BG, JCD, JIFV, AW, MG, CAI), pp. 186–189.
- MSR-2010-GegickRX #case study #debugging #identification #industrial #mining #security
- Identifying security bug reports via text mining: An industrial case study (MG, PR, TX), pp. 11–20.
- MSR-2010-MauczkaSFBG #mining #security
- Mining security changes in FreeBSD (AM, CS, FF, MB, TG), pp. 90–93.
- PLDI-2010-ChenCS #compilation #security #verification
- Type-preserving compilation of end-to-end verification of security enforcement (JC, RC, NS), pp. 412–423.
- ICALP-v1-2010-ApplebaumIK #performance #verification
- From Secrecy to Soundness: Efficient Verification via Secure Computation (BA, YI, EK), pp. 152–163.
- ICALP-v2-2010-ChandranGO #fault tolerance #network
- Improved Fault Tolerance and Secure Computation on Sparse Networks (NC, JAG, RO), pp. 249–260.
- SEFM-2010-Pavlovic #bibliography #effectiveness #perspective #security
- The Unreasonable Ineffectiveness of Security Engineering: An Overview (DP), pp. 12–18.
- SFM-2010-MalacariaH #data flow #security
- Information Theory and Security: Quantitative Information Flow (PM, JH), pp. 87–134.
- SFM-2010-WolterR #performance #security #trade-off
- Performance and Security Tradeoff (KW, PR), pp. 135–167.
- ICFP-2010-MorgensternL #programming
- Security-typed programming within dependently typed programming (JM, DRL), pp. 169–180.
- CHI-2010-BianchiOK
- The secure haptic keypad: a tactile password system (AB, IO, DSK), pp. 1089–1092.
- CHI-2010-BlomVSGAA #mobile #safety #security
- Fear and the city: role of mobile services in harnessing safety and security in urban use contexts (JB, DV, MS, JG, KA, RA), pp. 1841–1850.
- CHI-2010-DenningBFGKM #security
- Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices (TD, AB, BF, BTG, TK, WHM), pp. 917–926.
- CHI-2010-LucaHH #named
- ColorPIN: securing PIN entry through indirect input (ADL, KH, HH), pp. 1103–1106.
- CHI-2010-Villamarin-SalomonB #behaviour #using
- Using reinforcement to strengthen users’ secure behaviors (RVS, JCB), pp. 363–372.
- ICEIS-ISAS-2010-JiagueFGKLMS #functional #modelling #policy #security
- Model-driven Engineering of Functional Security Policies (MEJ, MF, FG, PK, RL, JM, RSD), pp. 374–379.
- CIKM-2010-BonifatiWL #distributed #named #peer-to-peer #privacy #social
- SPac: a distributed, peer-to-peer, secure and privacy-aware social space (AB, WHW, RL), pp. 1953–1954.
- ICPR-2010-BelguechiRA
- Biohashing for Securing Minutiae Template (RB, CR, SAA), pp. 1168–1171.
- ICPR-2010-HassanAMHW #authentication #image #self #using
- Secure Self-Recovery Image Authentication Using Randomly-Sized Blocks (AMH, AAH, BM, YMYH, MAAW), pp. 1445–1448.
- ICPR-2010-KumarTG #symmetry
- Combination of Symmetric Hash Functions for Secure Fingerprint Matching (GK, ST, VG), pp. 890–893.
- ICPR-2010-KunduD #image #security
- Lossless ROI Medical Image Watermarking Technique with Enhanced Security and High Payload Embedding (MKK, SD), pp. 1457–1460.
- ICPR-2010-YangBGB #security
- Renewable Minutiae Templates with Tunable Size and Security (BY, CB, DG, PB), pp. 878–881.
- KEOD-2010-TrikiBFH #design #modelling
- Modeling Conflict of Interest in the Design of Secure Data Warehouses (ST, HBA, JF, NH), pp. 445–448.
- KMIS-2010-KadhemAK #database #encryption #order #performance #relational
- A Secure and Efficient Order Preserving Encryption Scheme for Relational Databases (HK, TA, HK), pp. 25–35.
- KMIS-2010-MacePM #editing #ontology #security
- Ontology Editing Tool for Information Security and Human Factors Experts (JCM, SEP, APAvM), pp. 207–212.
- SEKE-2010-BernhartAMG #automation #case study #experience #framework #integration #testing #verification
- Automated Integration Testing and Verification of a Secured SOA Infrastructure — an Experience Report in eHealth (MB, TA, AM, TG), pp. 198–202.
- SEKE-2010-Bouabana-TebibelGM #ad hoc #protocol
- Secure ad-hoc routing protocol (TBT, RNG, SM), pp. 771–776.
- SEKE-2010-El-Attar #analysis #case study #precise #robust #security
- Developing Precise Misuse Cases with Security Robustness Analysis (MEA), pp. 571–576.
- SEKE-2010-MadieshW #process #top-down
- A Top-Down Method for Secure SOA-based B2B Processes (MM, GW), pp. 698–703.
- SEKE-2010-SeguraS #named #peer-to-peer #security
- P2PSecT: Peer-to-peer Security Testbed (ES, XS), pp. 783–786.
- SEKE-2010-WyethZ #architecture #security #specification
- Formal Specification of Software Architecture Security Tactics (AW, CZ), pp. 172–175.
- POPL-2010-BhargavanFG #composition #protocol #security #type system #verification
- Modular verification of security protocol code by typing (KB, CF, ADG), pp. 445–456.
- REFSQ-2010-IslamMW #elicitation #framework #privacy #requirements #security #towards
- Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations (SI, HM, SW), pp. 255–261.
- SAC-2010-CappelliCGL #analysis #requirements #security
- Transparency versus security: early analysis of antagonistic requirements (CC, HdSC, BGB, JCSdPL), pp. 298–305.
- SAC-2010-ClaycombLSK #network #policy #security
- A group-based security policy for wireless sensor networks (WC, RL, DS, BK), pp. 778–785.
- SAC-2010-ClaycombS #analysis #framework #security
- A framework for risk analysis in virtual directory security (WC, DS), pp. 1881–1882.
- SAC-2010-CuzzocreaB #distributed #framework #multi #privacy #xml
- A secure multiparty computation privacy preserving OLAP framework over distributed XML data (AC, EB), pp. 1666–1673.
- SAC-2010-Fenz #generative #metric #ontology
- Ontology-based generation of IT-security metrics (SF), pp. 1833–1839.
- SAC-2010-GrossklagsRCC #named #network #security
- Nudge: intermediaries’ role in interdependent network security (JG, SR, AAC, JC), pp. 1879–1880.
- SAC-2010-HoqueRA #named #protocol #scalability #using
- S-search: finding RFID tags using scalable and secure search protocol (MEH, FR, SIA), pp. 439–443.
- SAC-2010-LombardiP #security
- Transparent security for cloud (FL, RDP), pp. 414–415.
- SAC-2010-MohamedA #ad hoc #framework #network #novel
- Novel immune-based framework for securing ad hoc networks (YAM, ABA), pp. 1950–1957.
- ICSE-2010-DiosDSBCE #development #modelling #named #user interface
- SSG: a model-based development environment for smart, security-aware GUIs (MAGdD, CD, MS, DAB, MC, ME), pp. 311–312.
- ICSE-2010-Firesmith #requirements #summary #tutorial
- Engineering safety- and security-related requirements for software-intensive systems: tutorial summary (DGF), pp. 489–490.
- ICSE-2010-Staite #re-engineering
- Portable secure identity management for software engineering (CS), pp. 325–326.
- OSDI-2010-Chlipala #policy #security #static analysis
- Static Checking of Dynamically-Varying Security Policies in Database-Backed Applications (AC), pp. 105–118.
- CAV-2010-Jha #legacy #security
- Retrofitting Legacy Code for Security (SJ), p. 19.
- CSL-2010-BasinC #protocol #security
- Degrees of Security: Protocol Guarantees in the Face of Compromising Adversaries (DAB, CJFC), pp. 1–18.
- ICST-2010-ZimmermannNW #predict #security
- Searching for a Needle in a Haystack: Predicting Security Vulnerabilities for Windows Vista (TZ, NN, LAW), pp. 421–428.
- IJCAR-2010-ChevalCD #analysis #automation #constraints #equivalence #security
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (VC, HCL, SD), pp. 412–426.
- ISSTA-2010-Romero-MarionaZR #automation #named #requirements
- ASSURE: automated support for secure and usable requirements engineering (JRM, HZ, DJR), pp. 279–282.
- LICS-2010-Abadi #security
- The Fine Print of Security (MA), p. 110.
- ASE-2009-Romero-Mariona #requirements
- Secure and Usable Requirements Engineering (JRM), pp. 703–706.
- DAC-2009-Uchida #ubiquitous
- Single-electron devices for ubiquitous and secure computing applications (KU), pp. 301–303.
- DATE-2009-LiRJ #architecture
- An architecture for secure software defined radio (CL, AR, NKJ), pp. 448–453.
- DATE-2009-PatelPR #architecture #framework #named #security
- CUFFS: An instruction count based architectural framework for security of MPSoCs (KP, SP, RGR), pp. 779–784.
- ICDAR-2009-GarainH #authentication #documentation #security
- Machine Authentication of Security Documents (UG, BH), pp. 718–722.
- SIGMOD-2009-CorcoranSH #security #web
- Cross-tier, label-based security enforcement for web applications (BJC, NS, MWH), pp. 269–282.
- SIGMOD-2009-NathYC #outsourcing
- Secure outsourced aggregation via one-way chains (SN, HY, HC), pp. 31–44.
- SIGMOD-2009-NehmeLBR #approach #data type #named #privacy #security #towards
- StreamShield: a stream-centric approach towards security and privacy in data stream environments (RVN, HSL, EB, EAR), pp. 1027–1030.
- SIGMOD-2009-WongCKM #database
- Secure kNN computation on encrypted databases (WKW, DWLC, BK, NM), pp. 139–152.
- VLDB-2009-MukherjeeGDMZLKASW
- Oracle SecureFiles: Prepared for the Digital Deluge (NM, AG, VD, SM, WZ, SL, KK, BA, KS, SW), pp. 1501–1511.
- ITiCSE-2009-SaidGMJ #database #security
- Database and database application security (HES, MAMG, ZM, LJ), pp. 90–93.
- FASE-2009-HermannEE #graph #inheritance #network #security
- Transformation of Type Graphs with Inheritance for Ensuring Security in E-Government Networks (FH, HE, CE), pp. 325–339.
- FASE-2009-HuismanT #automaton #ml #security
- A Formal Connection between Security Automata and JML Annotations (MH, AT), pp. 340–354.
- CSMR-2009-NagyM #analysis #fault #security
- Static Security Analysis Based on Input-Related Software Faults (CN, SM), pp. 37–46.
- ICPC-2009-LiuM #static analysis
- Practical static analysis for inference of security-related program properties (YL, AM), pp. 50–59.
- STOC-2009-LinPV #concurrent #framework #security
- A unified framework for concurrent security: universal composability from stand-alone non-malleability (HL, RP, MV), pp. 179–188.
- ICALP-v2-2009-IbrahimKYZ #sublinear
- Secure Function Collection with Sublinear Storage (MHI, AK, MY, HSZ), pp. 534–545.
- FM-2009-McIverM #case study #composition #refinement #security
- Sums and Lovers: Case Studies in Security, Compositionality and Refinement (AM, CCM), pp. 289–304.
- FM-2009-McIverMM #probability #security
- Security, Probability and Nearly Fair Coins in the Cryptographers’ Café (AM, LM, CM), pp. 41–71.
- CHI-2009-LucaZH #authentication #named
- Vibrapass: secure authentication based on shared lies (ADL, EvZ, HH), pp. 913–916.
- HCD-2009-KondoY #case study #security
- HCD Case Study for the Information Security Training System (AK, MY), pp. 979–985.
- HIMI-DIE-2009-Ocenasek09a #approach #communication #design #embedded
- An Approach for the Design of Secure Communication in Embedded Systems (PO), pp. 579–586.
- HIMI-DIE-2009-Ocenasek09b #architecture #security #towards
- Towards Security Issues in ZigBee Architecture (PO), pp. 587–593.
- HIMI-DIE-2009-TarasewichNS #mobile #privacy #security
- Exploring Employee Perspectives on Information Privacy and Security in the Mobile Environment (PT, BN, MS), pp. 171–180.
- AdaEurope-2009-DelangePF #architecture #requirements #safety #security #validation
- Validating Safety and Security Requirements for Partitioned Architectures (JD, LP, PHF), pp. 30–43.
- CAiSE-2009-MouratidisSJ #case study #experience #health #information management #lessons learnt
- Secure Information Systems Engineering: Experiences and Lessons Learned from Two Health Care Projects (HM, AS, JJ), pp. 231–245.
- ICEIS-ISAS-2009-ArmenterosMMS #communication #dependence #prototype #security
- Security and Dependability in Ambient Intelligence Scenarios — The Communication Prototype (ÁA, AM, AM, DS), pp. 49–56.
- ICEIS-ISAS-2009-Barjis09a #information management #modelling #process #security
- Information Systems Security based on Business Process Modeling (JB), pp. 213–218.
- ICEIS-ISAS-2009-Peng #workflow
- A BPMN based Secure Workflow Model (LP), pp. 268–272.
- ICEIS-ISAS-2009-SunyaevKMK #analysis #health #security
- Security Analysis of the German Electronic Health Card’s Peripheral Parts (AS, AK, CM, HK), pp. 19–26.
- SEKE-2009-Abu-NimehMM #privacy #requirements #security
- Integrating Privacy Requirements into Security Requirements Engineering (SAN, SM, NRM), pp. 542–547.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- MoDELS-2009-LloydJ #analysis #authentication #ml #security #using
- Security Analysis of a Biometric Authentication System Using UMLsec and JML (JL, JJ), pp. 77–91.
- ECOOP-2009-DamJLP #java #monitoring #parallel #security #thread
- Security Monitor Inlining for Multithreaded Java (MD, BJ, AL, FP), pp. 546–569.
- PADL-2009-Moura #implementation
- Secure Implementation of Meta-predicates (PM), pp. 269–283.
- RE-2009-ElahiY #analysis #requirements #security #trade-off #trust
- Trust Trade-off Analysis for Security Requirements Engineering (GE, ESKY), pp. 243–248.
- RE-2009-LongLYJ #approach #evaluation #requirements #security
- AVT Vector: A Quantitative Security Requirements Evaluation Approach Based on Assets, Vulnerabilities and Trustworthiness of Environment (TL, LL, YY, ZJ), pp. 377–378.
- SAC-2009-AhamedKHZ #security #towards #trust
- Towards developing a trust-based security solution (SIA, DK, CSH, MZ), pp. 2204–2205.
- SAC-2009-DjalalievB #documentation #retrieval
- Secure web-based retrieval of documents with usage controls (PD, JCB), pp. 2062–2069.
- SAC-2009-HoqueRA #authentication #privacy #protocol #robust #security #using
- Supporting recovery, privacy and security in RFID systems using a robust authentication protocol (MEH, FR, SIA), pp. 1062–1066.
- SAC-2009-JesiMNS #approach
- Prestige-based peer sampling service: interdisciplinary approach to secure gossip (GPJ, EM, SKN, MvS), pp. 1209–1213.
- SAC-2009-KerschbaumDSB #communication #complexity #multi #on the #protocol
- On the practical importance of communication complexity for secure multi-party computation protocols (FK, DD, AS, DB), pp. 2008–2015.
- SAC-2009-LombardiP #kernel #linux #named #security #virtual machine
- KvmSec: a security extension for Linux kernel virtual machines (FL, RDP), pp. 2029–2034.
- SAC-2009-NeedelsK #distributed #peer-to-peer
- Secure routing in peer-to-peer distributed hash tables (KN, MK), pp. 54–58.
- SAC-2009-PassitoMM #analysis #network #protocol #using
- Analysis of the secure RTP protocol on voice over wireless networks using extended MedQoS (AP, EdSM, EM), pp. 86–87.
- SAC-2009-SchryenK #open source #security #towards
- Open source vs. closed source software: towards measuring security (GS, RK), pp. 2016–2023.
- SAC-2009-TangCCXHTC #network #peer-to-peer
- Securing key issuing in peer-to-peer networks (CT, RC, ZC, AX, JbH, LT, ZC), pp. 84–85.
- SAC-2009-YokoyamaHSK #internet #operating system #policy #security
- Simplifying security policy descriptions for internet servers in secure operating systems (TY, MH, MS, KK), pp. 326–333.
- ESEC-FSE-2009-BezemerMD #automation #interactive #security #testing #web
- Automated security testing of web widget interactions (CPB, AM, AvD), pp. 81–90.
- SOSP-2009-LiuGVQWM #distributed #framework #named
- Fabric: a platform for secure distributed computation and storage (JL, MDG, KV, XQ, LW, ACM), pp. 321–334.
- SOSP-2009-YipWZK #data flow #security
- Improving application security with data flow assertions (AY, XW, NZ, MFK), pp. 291–304.
- CADE-2009-CiobacaDK #convergence #equation #protocol #security
- Computing Knowledge in Security Protocols under Convergent Equational Theories (SC, SD, SK), pp. 355–370.
- CAV-2009-AbadiBC #modelling #protocol #proving #security
- Models and Proofs of Protocol Security: A Progress Report (MA, BB, HCL), pp. 35–49.
- ICLP-2009-HildebrandtL #concurrent #constraints #pattern matching #programming
- Types for Secure Pattern Matching with Local Knowledge in Universal Concurrent Constraint Programming (TTH, HAL), pp. 417–431.
- ICST-2009-MouelhiTB #functional #policy #security #testing
- Transforming and Selecting Functional Test Cases for Security Policy Testing (TM, YLT, BB), pp. 171–180.
- RTA-2009-BursucC #algebra #bound #protocol #security
- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (SB, HCL), pp. 133–147.
- TAP-2009-Chetali #certification #formal method #security #smarttech #testing
- Security Testing and Formal Methods for High Levels Certification of Smart Cards (BC), pp. 1–5.
- TestCom-FATES-2009-MarchandDJ #automation #data access #security #testing
- Automatic Testing of Access Control for Security Properties (HM, JD, TJ), pp. 113–128.
- VMCAI-2009-Cortier #protocol #security #verification
- Verification of Security Protocols (VC), pp. 5–13.
- ECSA-2008-ChatzigiannakisLSS #security
- A Security Model for Internet-Based Digital Asset Management Systems (IC, VL, DS, PGS), pp. 326–329.
- ASE-2008-YuJS #development #tool support #traceability
- Tools for Traceability in Secure Software Development (YY, JJ, JS), pp. 503–504.
- DAC-2008-PatelP #design #hardware #named #reliability #security
- SHIELD: a software hardware design methodology for security and reliability of MPSoCs (KP, SP), pp. 858–861.
- DATE-2008-ThoguluvaRC #architecture #performance #programmable #security #using
- Efficient Software Architecture for IPSec Acceleration Using a Programmable Security Processor (JT, AR, STC), pp. 1148–1153.
- DocEng-2008-GormishWPH #approach #distributed #documentation #flexibility #metadata #security
- Document logs: a distributed approach to metadata for better security and flexibility (MJG, GW, KWP, PH), pp. 119–122.
- VLDB-2008-MukherjeeAGKLMSWZ
- Oracle SecureFiles System (NM, BA, AG, KK, SL, SM, KS, SW, WZ), pp. 1301–1312.
- CSEET-2008-Epstein #agile #how #process #student
- Getting Students to Think About How Agile Processes can be Made More Secure (RGE), pp. 51–58.
- CSEET-2008-Epstein08a #process #re-engineering #security
- A Software Engineering Course with an Emphasis on Software Processes and Security (RGE), pp. 67–73.
- CSEET-2008-ShoemakerDIM #assurance #recommendation
- Integrating Secure Software Assurance Content with SE2004 Recommendations (DS, AD, JAI, NRM), pp. 59–66.
- ITiCSE-2008-CatuognoS #internet #network #security
- An internet role-game for the laboratory of network security course (LC, ADS), pp. 240–244.
- FASE-2008-JurjensSY #analysis #automation #security #using
- Automated Analysis of Permission-Based Security Using UMLsec (JJ, JS, YY), pp. 292–295.
- ICSM-2008-YuJM #maintenance #traceability
- Traceability for the maintenance of secure software (YY, JJ, JM), pp. 297–306.
- PEPM-2008-LamMLW #data flow #information management #web
- Securing web applications with static and dynamic information flow tracking (MSL, MCM, VBL, JW), pp. 3–12.
- STOC-2008-GordonHKL
- Complete fairness in secure two-party computation (SDG, CH, JK, YL), pp. 413–422.
- ICALP-B-2008-Canetti #analysis #composition #performance #security
- Composable Formal Security Analysis: Juggling Soundness, Simplicity and Efficiency (RC), pp. 1–13.
- ICALP-C-2008-HallgrenKSZ #protocol #quantum #verification
- Making Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum Attacks (SH, AK, PS, SZ), pp. 592–603.
- ICALP-C-2008-PrabhakaranR #encryption #security
- Homomorphic Encryption with CCA Security (MP, MR), pp. 667–678.
- ICALP-C-2008-WehnerW #bound #composition #security
- Composable Security in the Bounded-Quantum-Storage Model (SW, JW), pp. 604–615.
- FM-2008-ChetaliN #evaluation #formal method #industrial #security
- Industrial Use of Formal Methods for a High-Level Security Evaluation (BC, QHN), pp. 198–213.
- FM-2008-GrandyBSSR #protocol #security #verification
- Verification of Mondex Electronic Purses with KIV: From a Security Protocol to Verified Code (HG, MB, KS, GS, WR), pp. 165–180.
- FM-2008-LintelmanRLS #formal method #security
- Formal Methods for Trustworthy Skies: Building Confidence in the Security of Aircraft Assets Distribution (SL, RR, ML, KS), pp. 406–410.
- SEFM-2008-Giacobazzi #abstract interpretation #security
- Abstract Interpretation in Code Security (RG), p. 3.
- ICGT-2008-Grohmann #encryption #graph #security
- Security, Cryptography and Directed Bigraphs (DG), pp. 487–489.
- CHI-2008-ReederBCRBHS #authoring #policy #security #visualisation
- Expandable grids for visualizing and authoring computer security policies (RWR, LB, LFC, MKR, KB, KH, HS), pp. 1473–1482.
- CHI-2008-StollTES #named #security #visualisation
- Sesame: informing user security decisions with system visualization (JS, CST, WKE, KS), pp. 1045–1054.
- CAiSE-2008-MatuleviciusMMDHG #adaptation #development #information management #risk management #security
- Adapting Secure Tropos for Security Risk Management in the Early Phases of Information Systems Development (RM, NM, HM, ED, PH, NG), pp. 541–555.
- EDOC-2008-Quint #as a service #automation #distributed #security
- SOA Security — as a Service Automatic Conversion in Distributed Infrastructures (BQ).
- EDOC-2008-SommestadEJ #analysis #architecture #enterprise #graph #modelling #security
- Combining Defense Graphs and Enterprise Architecture Models for Security Analysis (TS, ME, PJ), pp. 349–355.
- ICEIS-ISAS2-2008-HuberSK #analysis #framework #health #security
- Security Analysis of the Health Care Telematics Infrastructure in Germany (MJH, AS, HK), pp. 144–153.
- ICEIS-ISAS2-2008-KiyomotoOT #automation #generative #on the fly #protocol #security
- On-the-Fly Automatic Generation of Security Protocols (SK, HO, TT), pp. 97–104.
- ICEIS-ISAS2-2008-TobarraCPC #protocol #verification
- Formal Verification of the Secure Sockets Layer Protocol (MLT, DC, JJP, FC), pp. 246–252.
- ICPR-2008-NagarNJ #fuzzy
- Securing fingerprint template: Fuzzy vault with minutiae descriptors (AN, KN, AKJ), pp. 1–4.
- SEKE-2008-LiuLZL #logic #protocol #security
- Supremum of Agent Number Needed in Analyzing Security Protocols Based on Horn Logic (FL, ZL, TZ, ML), pp. 795–801.
- SEKE-2008-ReddyreddyX #using #xml
- Securing Service-oriented Systems Using State-Based XML Firewall (AR, HX), pp. 512–518.
- SEKE-2008-Shaffer #domain model #security #source code #static analysis #verification
- A Security Domain Model for Static Analysis and Verification of Software Programs (ABS), pp. 673–678.
- SEKE-2008-TekbacakTD #approach #certification #data access #security #semantics #using
- A Semantic Based Certification and Access Control Approach Using Security Patterns on SEAGENT (FT, TT, OD), pp. 741–744.
- SEKE-2008-TsigkritisS #dependence #runtime #security
- Diagnosing Runtime Violations of Security & Dependability Properties (TT, GS), pp. 661–666.
- ECMDA-FA-2008-ClavelSBE #experience #industrial #modelling #security
- Model-Driven Security in Practice: An Industrial Experience (MC, VTdS, CB, ME), pp. 326–337.
- MoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing
- A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
- MoDELS-2008-MouelhiFBT #deployment #framework #modelling #policy #security #specification #testing
- A Model-Based Framework for Security Policy Specification, Deployment and Testing (TM, FF, BB, YLT), pp. 537–552.
- PPDP-2008-OlarteV #monad #security
- The expressivity of universal timed CCP: undecidability of Monadic FLTL and closure operators for security (CO, FDV), pp. 8–19.
- POPL-2008-FournetR #data flow #encryption #implementation #security
- Cryptographically sound implementations for typed information-flow security (CF, TR), pp. 323–335.
- RE-2008-CalleleNS #game studies #requirements #security #video
- Balancing Security Requirements and Emotional Requirements in Video Games (DC, EN, KS), pp. 319–320.
- RE-2008-WeissM #requirements #security
- Selecting Security Patterns that Fulfill Security Requirements (MW, HM), pp. 169–172.
- SAC-2008-AhamedRH #architecture #distributed #identification #scalability #using
- Secured tag identification using EDSA (enhanced distributed scalable architecture) (SIA, FR, MEH), pp. 1902–1907.
- SAC-2008-AkhterK
- Building secure e-business systems: technology and culture in the UAE (FA, LK), pp. 1474–1475.
- SAC-2008-BracherK #documentation #implementation #prototype
- Implementing secure document circulation: a prototype (SB, PK), pp. 1452–1456.
- SAC-2008-CamilleriBC #composition
- Securing aspect composition (AC, LB, GC), pp. 278–279.
- SAC-2008-DelessyF #process #security
- A pattern-driven security process for SOA applications (NAD, EBF), pp. 2226–2227.
- SAC-2008-GarciaT #security #semantics #using #web #web service
- Web service security management using semantic web techniques (DZGG, MBFdT), pp. 2256–2260.
- SAC-2008-LeeHCHS #file system
- Secure deletion for NAND flash file system (JL, JH, YC, JH, SYS), pp. 1710–1714.
- SAC-2008-OlarteV #concurrent #constraints #security #semantics
- Universal concurrent constraint programing: symbolic semantics and applications to security (CO, FDV), pp. 145–150.
- SAC-2008-ZhangNLH #approach #enterprise #modelling #network #security
- A model-based semi-quantitative approach for evaluating security of enterprise networks (ZZ, FNA, XL, PHH), pp. 1069–1074.
- ICSE-2008-JurjensSB #analysis #mobile #modelling #security
- Model-based security analysis for mobile communications (JJ, JS, PB), pp. 683–692.
- ICSE-2008-WhittleWH #case study #execution #modelling #security
- Executable misuse cases for modeling security concerns (JW, DW, MH), pp. 121–130.
- ICSE-2008-XiaoLG #distributed #protocol #security
- Developing a security protocol for a distributed decision support system in a healthcare environment (LX, PHL, AG), pp. 673–682.
- ASPLOS-2008-LvinNBZ #named #reliability #security
- Archipelago: trading address space for reliability and security (VBL, GN, EDB, BGZ), pp. 115–124.
- ASPLOS-2008-NightingalePCF #hardware #security
- Parallelizing security checks on commodity hardware (EBN, DP, PMC, JF), pp. 308–318.
- HPDC-2008-SmithSF #grid
- Securing stateful grid servers through virtual server rotation (MS, CS, BF), pp. 11–22.
- OSDI-2008-ZeldovichKDK #hardware #memory management #policy #security #using
- Hardware Enforcement of Application Security Policies Using Tagged Memory (NZ, HK, MD, CK), pp. 225–240.
- CAV-2008-BackesLMP #abstraction #analysis #protocol #security
- The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis (MB, SL, MM, KP), pp. 419–422.
- CAV-2008-Cremers #analysis #protocol #security #verification
- The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols (CJFC), pp. 414–418.
- ICLP-2008-Beauxis #concurrent #modelling #probability #security
- Probabilistic and Concurrent Models for Security (RB), pp. 801–802.
- ICLP-2008-BonattiCOS #privacy #security #trust
- Policy-Driven Negotiations and Explanations: Exploiting Logic-Programming for Trust Management, Privacy & Security (PAB, JLDC, DO, LS), pp. 779–784.
- ICLP-2008-Tsitovich #detection #model checking #security #using
- Detection of Security Vulnerabilities Using Guided Model Checking (AT), pp. 822–823.
- IJCAR-2008-Comon-Lundh #automation #challenge #protocol #security #verification
- Challenges in the Automated Verification of Security Protocols (HCL), pp. 396–409.
- IJCAR-2008-KremerMT #protocol #proving
- Proving Group Protocols Secure Against Eavesdroppers (SK, AM, RT), pp. 116–131.
- ISSTA-2008-BalzarottiBCFKRVV #security #testing
- Are your votes really counted?: testing the security of real-world electronic voting systems (DB, GB, MC, VF, RAK, WKR, FV, GV), pp. 237–248.
- MBT-2008-Jurjens #case study #modelling #security #testing #using
- Model-based Security Testing Using UMLsec: A Case Study (JJ), pp. 93–104.
- TestCom-FATES-2008-ShuCLLSL #framework #named #network #paradigm #security #testing
- VCSTC: Virtual Cyber Security Testing Capability — An Application Oriented Paradigm for Network Infrastructure Protection (GS, DC, ZL, NL, LS, DL), pp. 119–134.
- VMCAI-2008-Pistoia #program analysis #programming language #security
- Program Analysis and Programming Languages for Security (MP), p. 7.
- ASE-2007-Abi-AntounWT #consistency #data flow #diagrams #implementation #modelling #security
- Checking threat modeling data flow diagrams for implementation conformance and security (MAA, DW, PT), pp. 393–396.
- ASE-2007-JurjensY #modelling #security #tool support
- Tools for model-based security engineering: models vs. code (JJ, YY), pp. 545–546.
- CASE-2007-FagioliniVPDB #detection #distributed #implementation #monitoring #multi
- Local Monitor Implementation for Decentralized Intrusion Detection in Secure Multi-Agent Systems (AF, GV, LP, GD, AB), pp. 454–459.
- DAC-2007-KoushanfarP #encryption #security
- CAD-based Security, Cryptography, and Digital Rights Management (FK, MP), pp. 268–269.
- DAC-2007-MaoW #embedded #hardware
- Hardware Support for Secure Processing in Embedded Systems (SM, TW), pp. 483–488.
- DATE-2007-NarayananKB #clustering #performance
- Performance aware secure code partitioning (SHKN, MTK, RRB), pp. 1122–1127.
- DATE-2007-VerbauwhedeS #design #security #trust
- Design methods for security and trust (IV, PS), pp. 672–677.
- VLDB-2007-GeZ #query
- Answering Aggregation Queries in a Secure System Model (TG, SBZ), pp. 519–530.
- VLDB-2007-Sion #outsourcing
- Secure Data Outsourcing (RS), pp. 1431–1432.
- VLDB-2007-WongCHKM #mining #outsourcing #security
- Security in Outsourcing of Association Rule Mining (WKW, DWC, EH, BK, NM), pp. 111–122.
- ITiCSE-2007-Ghafarian #assurance #security
- Ideas for projects in undergraduate information assurance and security courses (AG), p. 322.
- ESOP-2007-MantelR #classification #security #what
- Controlling the What and Where of Declassification in Language-Based Security (HM, AR), pp. 141–156.
- TACAS-2007-CortierKS #analysis #automation #security
- Automatic Analysis of the Security of XOR-Based Key Management Schemes (VC, GK, GS), pp. 538–552.
- STOC-2007-IshaiKOS #multi
- Zero-knowledge from secure multiparty computation (YI, EK, RO, AS), pp. 21–30.
- STOC-2007-Katz #multi #on the
- On achieving the “best of both worlds” in secure multiparty computation (JK), pp. 11–20.
- ICALP-2007-KiayiasZ #adaptation #composition #security
- Trading Static for Adaptive Security in Universally Composable Zero-Knowledge (AK, HSZ), pp. 316–327.
- IFM-2007-BraghinSB #automation #mobile #policy #security #verification
- Automated Verification of Security Policies in Mobile Code (CB, NS, KBA), pp. 37–53.
- SEFM-2007-GrandyBSR #encoding #named #protocol #security
- ASN1-light: A Verified Message Encoding for Security Protocols (HG, RB, KS, WR), pp. 195–204.
- SEFM-2007-SalehD #approach #novel #security #verification
- Verifying Security Properties of Cryptoprotocols: A Novel Approach (MS, MD), pp. 349–360.
- CHI-2007-SinghCDAF #design #security #social
- Password sharing: implications for security design based on social practice (SS, AC, CD, GA, MF), pp. 895–904.
- HCI-AS-2007-HuangRS #bibliography #people #security
- A Survey of Factors Influencing People’s Perception of Information Security (DLH, PLPR, GS), pp. 906–915.
- HCI-AS-2007-ZouDDQ #dependence #information management #security
- Dependability and Security in Medical Information System (XZ, YSD, BND, MQ), pp. 549–558.
- HCI-IDU-2007-EktareY #security
- The Balancing Act Between Computer Security and Convenience (ME, YY), pp. 731–735.
- HCI-IPT-2007-ChoiY #multi #named #network
- MKPS: A Multi-level Key Pre-distribution Scheme for Secure Wireless Sensor Networks (SJC, HYY), pp. 808–817.
- HCI-IPT-2007-HuangT #scalability #security #smarttech
- A Wearable Computing Environment for the Security of a Large-Scale Factory (JyH, CHT), pp. 1113–1122.
- HCI-MIE-2007-CulenR #design #personalisation #privacy #security
- Designing Personalized Media Center with Focus on Ethical Issues of Privacy and Security (ALC, YR), pp. 829–835.
- OCSC-2007-MaAL #authentication #protocol
- Chameleon-Based Deniable Authenticated Key Agreement Protocol Secure Against Forgery (CM, JA, JL), pp. 124–133.
- SIGAda-2007-Chapman #named #security
- MF1: security by construction (RC), pp. 5–6.
- EDOC-2007-ChenAQH #network #security #self
- Self-Configuration of Network Security (HC, YBAN, GQ, SH), pp. 97–110.
- EDOC-2007-LiningtonL #approach #behaviour #modelling #security #using
- Incorporating Security Behaviour into Business Models Using a Model Driven Approach (PFL, PL), pp. 405–413.
- EDOC-2007-MohammadCWWS #architecture #multi #quality #security
- A Multi-Layer Security Enabled Quality of Service (QoS) Management Architecture (AM, AC, GW, CW, RAS), pp. 423–434.
- ICEIS-DISI-2007-BarkerD #algebra #information management #policy
- Secure knowledge exchange by policy algebra and erml (SB, PD), pp. 212–217.
- ICEIS-EIS-2007-Egyhazy #architecture #comparison #design #security
- Comparison of Five Architecture Description Languages on Design Focus, Security and Style (CJE), pp. 270–277.
- ICEIS-EIS-2007-EnstromWH #assurance #enterprise #security
- A Reference Model for Enterprise Security — High Assurance Enterprise Security (DWE, DW, SH), pp. 355–364.
- ICEIS-EIS-2007-FosterLHS #security
- A Change Strategy for Organisational Security: The Role of Critical Success Factors (SF, KL, PH, AS), pp. 375–380.
- ICEIS-EIS-2007-KukhunS #enterprise #information management #pervasive #security
- Interoperability in Pervasive Enterprise Information Systems — A Double-Faced Coin Between Security And Accessability (DAK, FS), pp. 237–242.
- ICEIS-EIS-2007-MehrS #modelling #security #uml
- Modelling of Message Security Concerns with UML (FM, US), pp. 365–374.
- KDD-2007-FastFMTJGK #detection #preprocessor #relational
- Relational data pre-processing techniques for improved securities fraud detection (ASF, LF, MEM, BJT, DJ, HGG, JK), pp. 941–949.
- SEKE-2007-OladimejiSC #approach #architecture #modelling
- A Model-driven Approach to Architecting Secure Software (EAO, SS, LC), p. 535–?.
- SEKE-2007-ShiN #component #java #named #security #static analysis
- SAFES: A Static Analysis for Field Security in Java Components (AS, GN), pp. 302–307.
- MoDELS-2007-BasinCDE #approach #metamodelling #modelling
- A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
- MoDELS-2007-BasinCDE #approach #metamodelling #modelling
- A Metamodel-Based Approach for Analyzing Security-Design Models (DAB, MC, JD, ME), pp. 420–435.
- LOPSTR-2007-BossiPR #algebra #process #refinement #security
- Action Refinement in Process Algebra and Security Issues (AB, CP, SR), pp. 201–217.
- POPL-2007-BugliesiG #abstraction #implementation
- Secure implementations of typed channel abstractions (MB, MG), pp. 251–262.
- POPL-2007-Malacaria #security
- Assessing security threats of looping constructs (PM), pp. 225–235.
- POPL-2007-YuCIS #javascript #security
- JavaScript instrumentation for browser security (DY, AC, NI, IS), pp. 237–249.
- RE-2007-AsnarGBMR #approach #empirical
- Secure and Dependable Patterns in Organizations: An Empirical Approach (YA, PG, RB, VM, CR), pp. 287–292.
- REFSQ-2007-DarimontL #requirements #security #uml
- Security Requirements for Civil Aviation with UML and Goal Orientation (RD, ML), pp. 292–299.
- SAC-2007-ClaycombS #collaboration #pervasive #resource management #towards
- Towards secure resource sharing for impromptu collaboration in pervasive computing (WC, DS), pp. 940–946.
- SAC-2007-KoralalageRMGC #approach #lifecycle #privacy #security
- POP method: an approach to enhance the security and privacy of RFID systems used in product lifecycle with an anonymous ownership transferring mechanism (KHSSK, MRS, JM, YG, JC), pp. 270–275.
- SAC-2007-MorimotoSGC #security #specification #verification
- Formal verification of security specifications with common criteria (SM, SS, YG, JC), pp. 1506–1512.
- SAC-2007-NoordendeBT #mobile #security #using
- Guarding security sensitive content using confined mobile agents (Gv'N, FMTB, AST), pp. 48–55.
- SAC-2007-OrlovskyR #distributed #policy #security
- Decentralized enforcement of security policies for distributed computational systems (AO, DR), pp. 241–248.
- SAC-2007-SpanoudakisKA #monitoring #security #towards
- Towards security monitoring patterns (GS, CK, KA), pp. 1518–1525.
- SAC-2007-TopkaraAT #multi #word
- Passwords decay, words endure: secure and re-usable multiple password mnemonics (UT, MJA, MT), pp. 292–299.
- SAC-2007-YaoKBT #distributed #security #web
- Decentralized authorization and data security in web content delivery (DY, YK, EB, RT), pp. 1654–1661.
- ESEC-FSE-2007-Hanna #implementation #lightweight #named #network #protocol #security #verification
- SLEDE: lightweight verification of sensor network security protocol implementations (YH), pp. 591–594.
- ICSE-2007-BestJN #distributed #information management #modelling #security #using
- Model-Based Security Engineering of Distributed Information Systems Using UMLsec (BB, JJ, BN), pp. 581–590.
- ICSE-2007-GanapathyKJJ #concept analysis #legacy #mining #using
- Mining Security-Sensitive Operations in Legacy Code Using Concept Analysis (VG, DK, TJ, SJ), pp. 458–467.
- ICSE-2007-PistoiaFFY #enterprise #modelling #policy #security #validation
- When Role Models Have Flaws: Static Validation of Enterprise Security Policies (MP, SJF, RJF, EY), pp. 478–488.
- ICSE-2007-RubinM #education #re-engineering #security
- Creating a Computer Security Curriculum in a Software Engineering Program (BSR, BSM), pp. 732–735.
- ICSE-2007-SkogsrudBCT #protocol #security
- Managing Impacts of Security Protocol Changes in Service-Oriented Applications (HS, BB, FC, FT), pp. 468–477.
- HPDC-2007-DemchenkoSGLGK #security
- Security and dynamics in customer controlled virtual workspace organisation (YD, FS, LG, CTAMdL, DLG, OK), pp. 231–232.
- SOSP-2007-ChongLMQVZZ #automation #clustering #web
- Secure web application via automatic partitioning (SC, JL, ACM, XQ, KV, LZ, XZ), pp. 31–44.
- SOSP-2007-CostaCZZP #named
- Bouncer: securing software by blocking bad input (MC, MC, LZ, LZ, MP), pp. 117–130.
- SOSP-2007-CriswellLDA #architecture #execution #operating system
- Secure virtual architecture: a safe execution environment for commodity operating systems (JC, AL, DD, VSA), pp. 351–366.
- AMOST-2007-MassonJPJD #automation #generative #modelling #security #testing
- Automatic generation of model based tests for a class of security properties (PAM, JJ, JCP, EJ, GD), pp. 12–22.
- SAT-2007-DeKV #using
- Inversion Attacks on Secure Hash Functions Using satSolvers (DD, AK, RV), pp. 377–382.
- ASE-2006-Jurjens #analysis #automation #java #proving #security #source code #theorem proving #using
- Security Analysis of Crypto-based Java Programs using Automated Theorem Provers (JJ), pp. 167–176.
- CASE-2006-Tan #automation #security
- Automatic Interpretation of Human and Vehicle Motion for Enhanced Security (TT), p. 2.
- DAC-2006-AroraRRSJC #architecture #mobile #multi #security
- Software architecture exploration for high-performance security processing on a multiprocessor mobile SoC (DA, AR, SR, MS, NKJ, STC), pp. 496–501.
- DAC-2006-InoueIKSE #architecture #mobile #named
- VIRTUS: a new processor virtualization architecture for security-oriented next-generation mobile terminals (HI, AI, MK, JS, ME), pp. 484–489.
- DAC-2006-RagelP #monitoring #named #reliability #security
- IMPRES: integrated monitoring for processor reliability and security (RGR, SP), pp. 502–505.
- DAC-2006-WangLLYHWH #design #framework #network #security
- A network security processor design based on an integrated SOC design and test platform (CHW, CYL, MSL, JCY, CTH, CWW, SYH), pp. 490–495.
- DATE-2006-HelyBFR #design
- A secure scan design methodology (DH, FB, MLF, BR), pp. 1177–1178.
- DATE-DF-2006-AkselrodAA #architecture #debugging #framework #independence #multi #security
- Platform independent debug port controller architecture with security protection for multi-processor system-on-chip ICs (DA, AA, YA), pp. 30–35.
- SIGMOD-2006-ManjhiAMMOT #data-driven #scalability #security #web
- Simultaneous scalability and security for data-intensive web applications (AM, AA, BMM, TCM, CO, AT), pp. 241–252.
- VLDB-2006-FanGJK #named #xml
- SMOQE: A System for Providing Secure Access to XML (WF, FG, XJ, AK), pp. 1227–1230.
- VLDB-2006-WangL #database #evaluation #performance #query #xml
- Efficient Secure Query Evaluation over Encrypted XML Databases (WHW, LVSL), pp. 127–138.
- CSEET-2006-MeadH #case study #education #re-engineering #requirements #security
- Security Requirements Engineering for Software Systems: Case Studies in Support of Software Engineering Education (NRM, EDH), pp. 149–158.
- CSEET-2006-Redwine #education #re-engineering
- Workshop on Secure Software Engineering Education & Training (WSSEET 2006) (STRJ), p. 245.
- FoSSaCS-2006-BackesMPV #analysis #encryption
- Symbolic and Cryptographic Analysis of the Secure WS-ReliableMessaging Scenario (MB, SM, BP, LV), pp. 428–445.
- WCRE-2006-MoonenM #security
- Code Based Software Security Assessments (LM, SM), p. 313.
- STOC-2006-IshaiKLP #black box
- Black-box constructions for secure computation (YI, EK, YL, EP), pp. 99–108.
- STOC-2006-KushilevitzLR #composition #protocol #security
- Information-theoretically secure protocols and security under composition (EK, YL, TR), pp. 109–118.
- ICALP-v2-2006-HarnikN #bound #hybrid #on the #security
- On Everlasting Security in the Hybrid Bounded Storage Model (DH, MN), pp. 192–203.
- ICALP-v2-2006-WikstromG #adaptation
- An Adaptively Secure Mix-Net Without Erasures (DW, JG), pp. 276–287.
- FM-2006-DelahayeED #security #using
- Certifying Airport Security Regulations Using the Focal Environment (DD, JFÉ, VDG), pp. 48–63.
- FM-2006-Johnson #effectiveness #re-engineering #security
- Cost Effective Software Engineering for Security (DRJ), pp. 607–611.
- FM-2006-Jurjens #modelling #security
- Model-Based Security Engineering for Real (JJ), pp. 600–606.
- FM-2006-Oheimb #formal method #security
- Formal Methods in the Security Business: Exotic Flowers Thriving in an Expanding Niche (DvO), pp. 592–597.
- FM-2006-Pavlovic #development #protocol
- Connector-Based Software Development: Deriving Secure Protocols (DP), pp. 598–599.
- FM-2006-Stephan #formal method #lightweight #plugin #security
- Formal Methods for Security: Lightweight Plug-In or New Engineering Discipline (WS), pp. 587–591.
- CHI-2006-WuMG #question #security
- Do security toolbars actually prevent phishing attacks? (MW, RCM, SLG), pp. 601–610.
- AdaEurope-2006-NarayananKBK #execution
- Secure Execution of Computations in Untrusted Hosts (SHKN, MTK, RRB, IK), pp. 106–118.
- CAiSE-2006-BrylMMZ #design #modelling #requirements #security
- Designing Security Requirements Models Through Planning (VB, FM, JM, NZ), pp. 33–47.
- CAiSE-2006-MouratidisJF #development #framework #towards
- Towards a Comprehensive Framework for Secure Systems Development (HM, JJ, JF), pp. 48–62.
- CAiSE-2006-YangNLC #approach #outsourcing #performance #query #xml
- An Efficient Approach to Support Querying Secure Outsourced XML Information (YY, WN, HLL, JC), pp. 157–171.
- EDOC-2006-AndersonR #enterprise #security
- Information Security Guidance for Enterprise Transformation (JAA, VR), pp. 459–462.
- EDOC-2006-KunduB #using #xml
- Secure Dissemination of XML Content Using Structure-based Routing (AK, EB), pp. 153–164.
- EDOC-2006-TangCLZY #evaluation #performance #security #web #web service
- A Performance Evaluation of Web Services Security (KT, SC, DL, JZ, BY), pp. 67–74.
- EDOC-2006-WangCL #enterprise #persistent #security
- Anonymity and Security Support for Persistent Enterprise Conversation (CW, DKWC, HfL), pp. 471–476.
- EDOC-2006-WangensteenLJD #authentication #enterprise
- Secured enterprise access with strong SIM authentication (AW, LL, IJ, TvD), pp. 463–466.
- ICEIS-ISAS-2006-BenferhatB #policy #security
- Argument-Based Approaches in Prioritized Conflicting Security Policies (SB, REB), pp. 349–354.
- ICEIS-ISAS-2006-Sucurovic #health #implementation #information management #named #web
- MEDIS — A Web Based Health Information System — Implementing Integrated Secure Electronic Health Record (SS), pp. 160–164.
- ICEIS-SAIC-2006-MaamarMB #approach #web #web service
- A Policy-Based Approach to Secure Context in a Web Services Environment (ZM, GKM, DB), pp. 100–105.
- CIKM-2006-BaileyHM #documentation #enterprise #implementation #performance #security #trade-off
- Secure search in enterprise webs: tradeoffs in efficient implementation for document level security (PB, DH, BM), pp. 493–502.
- CIKM-2006-Kielman #realtime #security
- The real-time nature and value of homeland security information (JK), p. 3.
- ICPR-v4-2006-XieZH #security
- NDFT-based Audio Watermarking Scheme with High Security (LX, JZ, HH), pp. 270–273.
- SEKE-2006-ManaSSM #towards
- Towards Secure Ambient Intelligence Scenarios (AM, FSC, DS, AM), pp. 386–391.
- SEKE-2006-Merz #approach #java #security #using
- Using the Dynamic Proxy Approach to Introduce Role-Based Security to Java Data Objects (MM), pp. 404–409.
- SEKE-2006-PauliX #case study #composition #consistency
- Ensuring Consistent Use/Misuse Case Decomposition for Secure Systems (JJP, DX), pp. 392–397.
- SEKE-2006-PilskalnsA #design #ocl #security #testing #uml #using
- Using UML Designs to Generate OCL for Security Testing (OP, AAA), pp. 505–510.
- MoDELS-2006-BruckerDW #analysis #model transformation #semantics
- A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
- MoDELS-2006-HafnerAB #architecture #modelling #qvt #security #towards
- Towards a MOF/QVT-Based Domain Architecture for Model Driven Security (MH, MA, RB), pp. 275–290.
- MoDELS-2006-BruckerDW #analysis #model transformation #semantics
- A Model Transformation Semantics and Analysis Methodology for SecureUML (ADB, JD, BW), pp. 306–320.
- MoDELS-2006-HafnerAB #architecture #modelling #qvt #security #towards
- Towards a MOF/QVT-Based Domain Architecture for Model Driven Security (MH, MA, RB), pp. 275–290.
- QAPL-2005-LanotteMT06 #classification #probability #security
- A Classification of Time and/or Probability Dependent Security Properties (RL, AMS, AT), pp. 177–193.
- LOPSTR-2006-MantelSK #data flow #proving #security #verification
- Combining Different Proof Techniques for Verifying Information Flow Security (HM, HS, TK), pp. 94–110.
- QAPL-2006-AdaoMRV #analysis #protocol #security #towards
- Towards a Quantitative Analysis of Security Protocols (PA, PM, TR, LV), pp. 3–25.
- POPL-2006-HuntS #on the #security
- On flow-sensitive security types (SH, DS), pp. 79–90.
- SAC-2006-CreeseGRX #ad hoc #multi #security
- Bootstrapping multi-party ad-hoc security (SC, MG, BR, MX), pp. 369–375.
- SAC-2006-HeatherS #analysis #infinity #protocol #security
- To infinity and beyond or, avoiding the infinite in security protocol analysis (JH, SS), pp. 346–353.
- SAC-2006-MorimotoSGC #security #specification #standard #verification
- A security specification verification technique based on the international standard ISO/IEC 15408 (SM, SS, YG, JC), pp. 1802–1803.
- SAC-2006-WelchL #policy #security
- Policy-driven reflective enforcement of security policies (IW, FL), pp. 1580–1584.
- ICSE-2006-BruschiWM #re-engineering
- Software engineering for secure systems (DB, BDW, MM), pp. 1007–1008.
- ICSE-2006-JurjensF #modelling #security #tool support
- Tools for model-based security engineering (JJ, JF), pp. 819–822.
- SPL-BOOK-2006-ArciniegasDRCBO #architecture #evolution #product line #reasoning #security
- Architecture Reasoning for Supporting Product Line Evolution: An Example on Security (JLA, JCD, JLR, RC, JBM, MO), pp. 327–372.
- SPL-BOOK-2006-FaegriH #architecture #product line #security
- A Software Product Line Reference Architecture for Security (TEF, SOH), pp. 275–326.
- CGO-2006-ZhangZP #compilation #optimisation #security
- Compiler Optimizations to Reduce Security Overhead (TZ, XZ, SP), pp. 346–357.
- HPCA-2006-ShiFGLZY #architecture #in memory #memory management #named #security
- InfoShield: a security architecture for protecting information usage in memory (WS, JBF, GG, HHSL, YZ, JY), pp. 222–231.
- OSDI-2006-CastroCH #data flow
- Securing Software by Enforcing Data-flow Integrity (MC, MC, TLH), pp. 147–160.
- FATES-RV-2006-FalconeFMR #calculus #framework #network #policy #security
- A Test Calculus Framework Applied to Network Security Policies (YF, JCF, LM, JLR), pp. 55–69.
- ICLP-2006-LopezPPRV #concurrent #constraints #declarative #framework #programming #security
- A Declarative Framework for Security: Secure Concurrent Constraint Programming (HAL, CP, JAP, CR, FDV), pp. 449–450.
- LICS-2006-Gordon #implementation #protocol #security
- Provable Implementations of Security Protocols (ADG), pp. 345–346.
- TestCom-2006-DarmaillacqFGMR #generative #network #security #testing
- Test Generation for Network Security Rules (VD, JCF, RG, LM, JLR), pp. 341–356.
- TestCom-2006-ShuL #monitoring #protocol #security #testing
- Message Confidentiality Testing of Security Protocols — Passive Monitoring and Active Checking (GS, DL), pp. 357–372.
- ASE-2005-Dolstra #deployment
- Secure sharing between untrusted users in a transparent source/binary deployment model (ED), pp. 154–163.
- ASE-2005-JurjensY #analysis #security
- Code security analysis with assertions (JJ, MY), pp. 392–395.
- ASE-2005-XuN #approach #modelling #verification
- A threat-driven approach to modeling and verifying secure software (DX, KEN), pp. 342–346.
- CASE-2005-HungHWCLH #collaboration #framework
- A secure collaborative e-diagnostics framework for semiconductor factories (MHH, FYH, TLW, FTC, RL, TH), pp. 185–190.
- DAC-2005-ChoM #network #pattern matching #security
- A pattern matching coprocessor for network security (YHC, WHMS), pp. 234–239.
- DAC-2005-YangWK #architecture
- Secure scan: a design-for-test architecture for crypto chips (BY, KW, RK), pp. 135–140.
- DATE-2005-AroraRRJ #embedded #monitoring #runtime
- Secure Embedded Processing through Hardware-Assisted Run-Time Monitoring (DA, SR, AR, NKJ), pp. 178–183.
- DATE-2005-FaroukS #algorithm #communication #encryption #hybrid #implementation #security
- An Improved FPGA Implementation of the Modified Hybrid Hiding Encryption Algorithm (MHHEA) for Data Communication Security (HAF, MS), pp. 76–81.
- DATE-2005-TiriV05a #design
- A VLSI Design Flow for Secure Side-Channel Attack Resistant ICs (KT, IV), pp. 58–63.
- PODS-2005-AbadiW #analysis #documentation #encryption #security #xml
- Security analysis of cryptographically controlled access to XML documents (MA, BW), pp. 108–117.
- ITiCSE-2005-TobinW #education #security #using
- Using a windows attack intRusion emulator (AWARE) to teach computer security awareness (DLTJ, MSW), pp. 213–217.
- ESOP-2005-CortierW #automation #protocol #proving #security
- Computationally Sound, Automated Proofs for Security Protocols (VC, BW), pp. 157–171.
- ESOP-2005-Myers #policy #programming #security
- Programming with Explicit Security Policies (ACM), pp. 1–4.
- ESOP-2005-TseZ #classification #design
- A Design for a Security-Typed Language with Certificate-Based Declassification (ST, SZ), pp. 279–294.
- FASE-2005-JurjensS #analysis #development #security #tool support #uml
- Tools for Secure Systems Development with UML: Security Analysis with ATPs (JJ, PS), pp. 305–309.
- FASE-2005-Mostowski #formal method #java #logic #security #verification
- Formalisation and Verification of Java Card Security Properties in Dynamic Logic (WM), pp. 357–371.
- FoSSaCS-2005-FocardiRS #calculus #process #security
- Bridging Language-Based and Process Calculi Security (RF, SR, AS), pp. 299–315.
- ICSM-2005-Jurjens #comprehension #implementation #security
- Understanding Security Goals Provided by Crypto-Protocol Implementations (JJ), pp. 643–646.
- IWPC-2005-HogganvikS #comprehension #on the #security
- On the Comprehension of Security Risk Scenarios (IH, KS), pp. 115–124.
- PASTE-2005-Myers #distributed #program analysis #program transformation
- Making distributed systems secure with program analysis and transformation (ACM), p. 47.
- WCRE-2005-WangCD #security #using
- Enhancing Security Using Legality Assertions (LW, JRC, TRD), pp. 35–44.
- PLDI-2005-BauerLW #policy #security
- Composing security policies with polymer (LB, JL, DW), pp. 305–314.
- SAS-2005-Gordon #calculus #process #security
- From Typed Process Calculi to Source-Based Security (ADG), p. 2.
- SAS-2005-TerauchiA #data flow #problem #safety
- Secure Information Flow as a Safety Problem (TT, AA), pp. 352–367.
- STOC-2005-KalaiLP #composition #concurrent #protocol
- Concurrent general composition of secure protocols in the timing model (YTK, YL, MP), pp. 644–653.
- ICALP-2005-CrescenzoK #communication
- Asynchronous Perfectly Secure Communication over One-Time Pads (GDC, AK), pp. 216–227.
- ICALP-2005-DattaDMST #logic #polynomial #probability #protocol #security #semantics
- Probabilistic Polynomial-Time Semantics for a Protocol Security Logic (AD, AD, JCM, VS, MT), pp. 16–29.
- ICALP-2005-Hopper #on the #security
- On Steganographic Chosen Covertext Security (NH), pp. 311–323.
- ICALP-2005-LipmaaWB #security #verification
- Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction (HL, GW, FB), pp. 459–471.
- ICALP-2005-TamassiaT #bound #security
- Computational Bounds on Hierarchical Data Processing with Applications to Information Security (RT, NT), pp. 153–165.
- FM-2005-AndronickCP #embedded #security #smarttech #source code #verification
- Formal Verification of Security Properties of Smart Card Embedded Source Code (JA, BC, CPM), pp. 302–317.
- FM-2005-BuchholtzGHM #analysis #framework #performance #security
- End-to-End Integrated Security and Performance Analysis on the DEGAS Choreographer Platform (MB, SG, VH, CM), pp. 286–301.
- IFM-2005-BracherK #security #specification #testing
- Enabling Security Testing from Specification to Code (SB, PK), pp. 150–166.
- SEFM-2005-GrandySR #java #kernel #object-oriented #verification
- Object Oriented Verification Kernels for Secure Java Applications (HG, KS, WR), pp. 170–179.
- CHI-2005-GarfinkelMSNM #email #how
- How to make secure email easier to use (SLG, DM, JIS, EN, RCM), pp. 701–710.
- EDOC-2005-JohanssonJ #assessment #enterprise #security
- Assessment of Enterprise Information Security — The Importance of Prioritization (EJ, PJ), pp. 207–218.
- ICEIS-v1-2005-Fernandez #design #security #uml #using
- Security Patterns and Secure Systems Design Using UML (EBF), p. 21.
- ICEIS-v1-2005-KaurSS #algorithm #concurrent #database #distributed #multi
- Secure Concurrency Control Algorithm for Multilevel Secure Distributed Database Systems (NK, RS, HKS), pp. 267–272.
- ICEIS-v1-2005-RadhaGK #database #enterprise
- Securing the Enterprise Database (VR, VPG, NHK), pp. 76–83.
- ICEIS-v2-2005-NixFM #correlation #multi #scalability
- Anatomy of a Secure and Scalable Multiagent System for Event Capture and Correlation (TN, KF, FM), pp. 233–238.
- ICEIS-v3-2005-HafnerBB #architecture #security #standard #web #web service #workflow
- A Security Architecture for Inter-Organizational Workflows: Putting Security Standards for Web Services Together (MH, RB, MB), pp. 128–135.
- ICEIS-v3-2005-XuP #architecture #design #information management
- Threat-Driven Architectural Design of Secure Information Systems (DX, JJP), pp. 136–143.
- CIKM-2005-CarminatiFB #xml
- Securing XML data in third-party distribution systems (BC, EF, EB), pp. 99–106.
- KDD-2005-NevilleSJKPG #information management #relational #using
- Using relational knowledge discovery to prevent securities fraud (JN, ÖS, DJ, JK, KP, HGG), pp. 449–458.
- SEKE-2005-CooperDW #approach #architecture #aspect-oriented #modelling #reuse #security
- Modeling Reusable Security Aspects for Software Architectures: a Pattern Driven Approach (KMLC, LD, WEW), pp. 158–162.
- SEKE-2005-HanCD #mobile
- Secure Electronic Commerce with Mobile Agents (SH, EC, TSD), pp. 777–782.
- SEKE-2005-KongOF #analysis #formal method #security #workflow
- Formal Analysis of Workflow Systems with Security Considerations (WK, KO, KF), pp. 531–536.
- MoDELS-2005-HafnerB #modelling #security #uml #workflow
- Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0 (MH, RB), pp. 39–53.
- MoDELS-2005-JurjensH #modelling #uml
- Dynamic Secure Aspect Modeling with UML: From Models to Code (JJ, SHH), pp. 142–155.
- MoDELS-2005-HafnerB #modelling #security #uml #workflow
- Realizing Model Driven Security for Inter-organizational Workflows with WS-CDL and UML 2.0 (MH, RB), pp. 39–53.
- MoDELS-2005-JurjensH #modelling #uml
- Dynamic Secure Aspect Modeling with UML: From Models to Code (JJ, SHH), pp. 142–155.
- OOPSLA-2005-MartinLL #fault #query #security #using
- Finding application errors and security flaws using PQL: a program query language (MCM, VBL, MSL), pp. 365–383.
- QAPL-2004-BodeiCDBNNP05 #evaluation #performance #protocol #security
- Performance Evaluation of Security Protocols Specified in LySa (CB, MC, PD, MB, FN, HRN, CP), pp. 167–189.
- PPDP-2005-EchahedP #declarative #policy #security
- Security policy in a declarative style (RE, FP), pp. 153–163.
- PPDP-2005-Mitchell #analysis #logic #network #protocol #security
- Security analysis of network protocols: logical and computational methods (JCM), pp. 151–152.
- RE-2005-GiorginiMMZ #modelling #requirements #security
- Modeling Security Requirements Through Ownership, Permission and Delegation (PG, FM, JM, NZ), pp. 167–176.
- RE-2005-GiorginiMMZ05a #automation #named #requirements #security
- ST-Tool: A CASE Tool for Security Requirements Engineering (PG, FM, JM, NZ), pp. 451–452.
- SAC-2005-AdaikkalavanC #approach #named #security #web
- SmartGate: a smart push-pull approach to support role-based security in web gateways (RA, SC), pp. 1727–1731.
- SAC-2005-Khurana #scalability #security
- Scalable security and accounting services for content-based publish/subscribe systems (HK), pp. 801–807.
- SAC-2005-KhuranaSB #email #named
- SELS: a secure e-mail list service (HK, AJS, RB), pp. 306–313.
- SAC-2005-Menezes #adaptation #case study #coordination #security #self
- Self-organization and computer security: a case study in adaptive coordination (RM), pp. 467–468.
- SAC-2005-SohrDA #information management #policy #security #specification
- Formal specification of role-based security policies for clinical information systems (KS, MD, GJA), pp. 332–339.
- SAC-2005-YangEY #database #security #semistructured data #specification
- Mediation security specification and enforcement for heterogeneous databases (LY, RKE, HY), pp. 354–358.
- ICSE-2005-AvotsDLL #analysis #c #pointer #security
- Improving software security with a C pointer analysis (DA, MD, VBL, MSL), pp. 332–341.
- ICSE-2005-Jurjens #effectiveness #modelling #security #tool support #uml
- Sound methods and effective tools for model-based security engineering with UML (JJ), pp. 322–331.
- ICSE-2005-Peine #re-engineering
- Rules of thumb for secure software engineering (HP), pp. 702–703.
- CC-2005-LiCKB #approach #security
- A Compiler-Based Approach to Data Security (FL, GC, MTK, RRB), pp. 188–203.
- CGO-2005-ZhangZP
- Building Intrusion-Tolerant Secure Software (TZ, XZ, SP), pp. 255–266.
- HPCA-2005-ZhangGYZG #memory management #multi #named #security #symmetry
- SENSS: Security Enhancement to Symmetric Shared Memory Multiprocessors (YZ, LG, JY, XZ, RG), pp. 352–362.
- HPDC-2005-Thain #grid
- Identity boxing: secure user-level containment for the grid (DT), pp. 299–300.
- CADE-2005-Steel #api #constraints #deduction #modelling #security
- Deduction with XOR Constraints in Security API Modelling (GS), pp. 322–336.
- CAV-2005-ArmandoBBCCCDHKMMORSTVV #automation #internet #protocol #security #validation
- The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications (AA, DAB, YB, YC, LC, JC, PHD, PCH, OK, JM, SM, DvO, MR, JS, MT, LV, LV), pp. 281–285.
- ICLP-2005-CorinSE #analysis #constraints #protocol #security
- PS-LTL for Constraint-Based Security Protocol Analysis (RC, AS, SE), pp. 439–440.
- LICS-2005-BlanchetAF #automation #protocol #security #verification
- Automated Verification of Selected Equivalences for Security Protocols (BB, MA, CF), pp. 331–340.
- DAC-2004-RaviKLMR #design #embedded #security
- Security as a new dimension in embedded system design (SR, PCK, RBL, GM, AR), pp. 753–760.
- DATE-v1-2004-MetraMO #design #fault #question #testing
- Are Our Design for Testability Features Fault Secure? (CM, TMM, MO), pp. 714–715.
- DATE-v1-2004-RenaudinBPTSG #security
- High Security Smartcards (MR, GFB, PP, JPT, LS, FG), pp. 228–233.
- DATE-v1-2004-TiriV #design #implementation #logic
- A Logic Level Design Methodology for a Secure DPA Resistant ASIC or FPGA Implementation (KT, IV), pp. 246–251.
- DATE-v2-2004-GuilleyHMPP #hardware
- CMOS Structures Suitable for Secured Hardware (SG, PH, YM, RP, JP), pp. 1414–1415.
- SIGMOD-2004-FanCG #query #security #xml
- Secure XML Querying with Security Views (WF, CYC, MNG), pp. 587–598.
- SIGMOD-2004-Gudgin #architecture #reliability #web #web service
- Secure, Reliable, Transacted; Innovation in Web Services Architecture (MG), pp. 879–880.
- SIGMOD-2004-Hall #challenge #policy #requirements
- Requirements and Policy Challenges in Highly Secure Environments (DEH), pp. 897–898.
- SIGMOD-2004-Maurer #database #encryption #security
- The Role of Cryptography in Database Security (UMM), pp. 5–10.
- SIGMOD-2004-RosenthalW #research #scalability #security #state of the art
- Security of Shared Data in Large Systems: State of the Art and Research Directions (AR, MW), pp. 962–964.
- VLDB-2004-AbiteboulABCFMS #distributed #peer-to-peer #privacy
- An Electronic Patient Record “on Steroids”: Distributed, Peer-to-Peer, Secure and Privacy-conscious (SA, BA, OB, BC, IF, TM, AS), pp. 1273–1276.
- VLDB-2004-RosenthalW #research #scalability #security #state of the art
- Security of Shared Data in Large Systems: State of the Art and Research Directions (AR, MW), p. 1242.
- VLDB-2004-YangL #information management #xml
- Secure XML Publishing without Information Leakage in the Presence of Data Inference (XY, CL), pp. 96–107.
- CSEET-2004-McGraw #security
- Software Security Clue Distribution (GM), pp. 6–7.
- ITiCSE-WGR-2004-Campbell #assurance #security
- IT security and data assurance: a new resource for two-year colleges (RDC), p. 20.
- FoSSaCS-2004-RamanathanMST #analysis #bisimulation #equivalence #network #probability #protocol #security
- Probabilistic Bisimulation and Equivalence for Security Analysis of Network Protocols (AR, JCM, AS, VT), pp. 468–483.
- TACAS-2004-PiazzaPR #named #persistent #security
- CoPS — Checker of Persistent Security (CP, EP, SR), pp. 144–152.
- STOC-2004-HarnikNRR #perspective
- Completeness in two-party secure computation: a computational view (DH, MN, OR, AR), pp. 252–261.
- STOC-2004-Pass #bound #multi
- Bounded-concurrent secure multi-party computation with a dishonest majority (RP), pp. 232–241.
- STOC-2004-PrabhakaranS #security
- New notions of security: achieving universal composability without trusted setup (MP, AS), pp. 242–251.
- ICALP-2004-AbadiC #equation #protocol #security
- Deciding Knowledge in Security Protocols Under Equational Theories (MA, VC), pp. 46–58.
- ICALP-2004-AwerbuchS #distributed #protocol
- Group Spreading: A Protocol for Provably Secure Distributed Name Service (BA, CS), pp. 183–195.
- SEFM-2004-LanotteMT #decidability #parametricity #probability #security
- Decidability Results for Parametric Probabilistic Transition Systems with an Application to Security (RL, AMS, AT), pp. 114–121.
- SIGAda-2004-ChapmanH #analysis #data flow #modelling #safety #security
- Enforcing security and safety models with an information flow analysis tool (RC, AH), pp. 39–46.
- SIGAda-2004-Davis #component #information management #lifecycle #security
- Information systems security engineering: a critical component of the systems engineering lifecycle (JFD), pp. 13–18.
- CAiSE-2004-GePL #analysis #database
- Secure Databases: An Analysis of Clark-Wilson Model in a Database Environment (XG, FP, RL), pp. 234–247.
- EDOC-2004-YoshiokaHF #coordination #performance #security
- Security Patterns: A Method for Constructing Secure and Efficient Inter-Company Coordination Systems (NY, SH, AF), pp. 84–97.
- ICEIS-v2-2004-BelsisGSD #implementation #information management #security
- Implementing Knowledge Management Techniques for Security Purposes (PB, SG, CS, ID), pp. 535–540.
- ICEIS-v3-2004-ChapmanS #enterprise #guidelines #on the #security
- On Information Security Guidelines for Small/Medium Enterprises (DC, LS), pp. 3–9.
- ICEIS-v3-2004-FerreiraCC #approach
- Securing a Web-Based EPR: An Approach to Secure a Centralized EPR Within a Hospital (AMF, RJCC, AdCP), pp. 54–59.
- ICEIS-v3-2004-MouratidisGM #design #information management #security #using
- Using Security Attack Scenarios to Analyse Security During Information Systems Design (HM, PG, GAM), pp. 10–17.
- ICEIS-v3-2004-Tu #security #using
- Using SAP System Configuration Security Test to Comply with Sarbanesoxley Act (JHT), pp. 581–583.
- ICEIS-v3-2004-VasiuD #architecture #security #web #web service #xml
- A Requirement for a XML Web Services Security Architecture (LV, CD), pp. 60–66.
- ICEIS-v5-2004-Mikulecky #design #library #security
- Digital Library: Design and Security Considerations (SM), pp. 295–300.
- SEKE-2004-GaoDYHBC #case study #design #security
- Applying Aspect-Orientation in Designing Security Systems: A Case Study (SG, YD, HY, XH, KB, KMLC), pp. 360–365.
- SEKE-2004-YangEY #approach #aspect-oriented #security
- Enhancing Mediation Security by Aspect-Oriented Approach (LY, RKE, HY), pp. 155–160.
- SEKE-2004-YuHDM #architecture #design #security
- Integrating Security Administration into Software Architectures Design (HY, XH, YD, LM), pp. 416–420.
- UML-2004-AbieAKMR #security #uml
- Integrating a Security Requirement Language with UML (HA, DBA, TK, SM, TR), pp. 350–364.
- UML-2004-Fernandez-MedinaP #database #development #ocl
- Extending OCL for Secure Database Development (EFM, MP), pp. 380–394.
- UML-2004-JurjensS #automation #modelling #requirements #security #verification
- Automated Verification of UMLsec Models for Security Requirements (JJ, PS), pp. 365–379.
- LOPSTR-2004-BossiPR #imperative #security
- Unwinding Conditions for Security in Imperative Languages (AB, CP, SR), pp. 85–100.
- RE-2004-HaleyLMN #requirements #security #trust
- The Effect of Trust Assumptions on the Elaboration of Security Requirements (CBH, RCL, JDM, BN), pp. 102–111.
- RE-2004-LinNIJ #bound #problem #security #using
- Using Abuse Frames to Bound the Scope of Security Problems (LL, BN, DCI, MJ), pp. 354–355.
- SAC-J-2003-FenicleW04
- A secure methodology for interchangeable services (BF, TW), pp. 343–349.
- SAC-2004-BamasakZ #mobile
- A secure method for signature delegation to mobile agents (OB, NZ), pp. 813–818.
- SAC-2004-BellaR #security
- Editoral message: special track on computer security (GB, PR), pp. 373–374.
- SAC-2004-Bracha #programming language #towards
- Keynote address: towards secure systems programming languages (GB), pp. 1–2.
- SAC-2004-BravettiLZG #e-commerce #quality #security #web #web service
- Web Services for E-commerce: guaranteeing security access and quality of service (MB, RL, GZ, RG), pp. 800–806.
- SAC-2004-CarvalhoCSBF #mobile #network #security #using
- Using mobile agents as roaming security guards to test and improve security of hosts and networks (MMC, TBC, NS, MRB, KMF), pp. 87–93.
- SAC-2004-LucchiZ #coordination #data-driven #named #web #web service
- WSSecSpaces: a secure data-driven coordination service for Web Services applications (RL, GZ), pp. 487–491.
- FSE-2004-Wolf #question #re-engineering #security
- Is security engineering really just good software engineering? (ALW), p. 1.
- ICSE-2004-Lamsweerde #anti #requirements #security
- Elaborating Security Requirements by Construction of Intentional Anti-Models (AvL), pp. 148–157.
- ASPLOS-2004-SuhLZD #data flow #execution #information management
- Secure program execution via dynamic information flow tracking (GES, JWL, DZ, SD), pp. 85–96.
- HPDC-2004-DenisAHVKB #communication #performance #problem #security
- Wide-Area Communication for Grids: An Integrated Solution to Connectivity, Performance and Security Problems (AD, OA, RFHH, KV, TK, HEB), pp. 97–106.
- OSDI-2004-LiKMS #repository
- Secure Untrusted Data Repository (SUNDR) (JL, MNK, DM, DS), pp. 121–136.
- OSDI-2004-RinardCDRLB #security
- Enhancing Server Availability and Security Through Failure-Oblivious Computing (MCR, CC, DD, DMR, TL, WSB), pp. 303–316.
- LICS-2004-ChatterjeeHJ #game studies
- Games with Secure Equilibria (KC, TAH, MJ), pp. 160–169.
- VMCAI-2004-BartheBR #compilation #security
- Security Types Preserving Compilation: (Extended Abstract) (GB, AB, TR), pp. 2–15.
- VMCAI-2004-Guttman #protocol #security #trust
- Security, Protocols, and Trust (JDG), p. 1.
- DAC-2003-HwangLSSFYHV #design #embedded
- Design flow for HW / SW acceleration transparency in the thumbpod secure embedded system (DDH, BCL, PS, KS, YF, SY, AH, IV), pp. 60–65.
- DATE-2003-KazmierskiY #design #framework
- A Secure Web-Based Framework for Electronic System Level Design (TJK, XQY), pp. 11140–11143.
- DATE-2003-RaghunathanRHQ #challenge #design #mobile
- Securing Mobile Appliances: New Challenges for the System Designer (AR, SR, SH, JJQ), pp. 10176–10183.
- ICDAR-2003-HoqueSHFD #documentation #modelling #named #novel
- SAGENT: A Novel Technique for Document Modeling for Secure Access and Distribution (SH, HS, GH, MCF, FD), pp. 1257–1261.
- SIGMOD-2003-ChoALS #named #query #xml
- LockX: A System for Efficiently Querying Secure XML (SC, SAY, LVSL, DS), p. 669.
- VLDB-2003-BouganimNPW #data access #encryption
- Chip-Secured Data Access: Reconciling Access Rights with Data Encryption (LB, FDN, PP, LW), pp. 1133–1136.
- ITiCSE-2003-AzadeganLOWZ #security
- An undergraduate track in computer security (SA, ML, MO, ALW, MZ), pp. 207–210.
- ITiCSE-2003-CampbellHK03a
- The role of two-year colleges in educating the cyber-security workforce (RDC, EKH, KJK), p. 235.
- ESOP-2003-Comon-LundhC #security
- Security Properties: Two Agents Are Sufficient (HCL, VC), pp. 99–113.
- ESOP-2003-GiambiagiD #implementation #on the #protocol #security
- On the Secure Implementation of Security Protocols (PG, MD), pp. 144–158.
- ESOP-2003-Laud #analysis #data flow #encryption
- Handling Encryption in an Analysis for Secure Information Flow (PL), pp. 159–173.
- ESOP-2003-Leroy #perspective #programming language #security #static analysis
- Computer Security from a Programming Language and Static Analysis Perspective (XL), pp. 1–9.
- ESOP-2003-Meadows #analysis #encryption #evolution #protocol #requirements #specification #what
- What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis (CM), pp. 10–21.
- FASE-2003-ScottBM #mobile #policy #security
- Spatial Security Policies for Mobile Agents in a Sentient Computing Environment (DJS, ARB, AM), pp. 102–117.
- CSMR-2003-LundBS #assessment #maintenance #security
- Maintaining Results from Security Assessment (MSL, FdB, KS), pp. 341–350.
- ICSM-2003-DaCostaDMP #security
- Characterizing the “Security Vulnerability Likelihood” of Software Functions (DD, CD, SM, VP), p. 266–?.
- WCRE-2003-DahnM #c #program transformation #source code #using
- Using Program Transformation to Secure C Programs Against Buffer Overflows (CD, SM), pp. 323–333.
- STOC-2003-Lindell #bound
- Bounded-concurrent secure two-party computation without setup assumptions (YL), pp. 683–692.
- FME-2003-ArmandoCG #analysis #graph #model checking #protocol #satisfiability #security #using
- SAT-Based Model-Checking of Security Protocols Using Planning Graph Analysis (AA, LC, PG), pp. 875–893.
- FME-2003-Vigna #security
- A Topological Characterization of TCP/IP Security (GV), pp. 914–939.
- SEFM-2003-BossiFPR #data flow #refinement #security
- Refinement Operators and Information Flow Security (AB, RF, CP, SR), pp. 44–53.
- SEFM-2003-LanotteMT #automaton #bisimulation #probability #security
- Weak Bisimulation for Probabilistic Timed Automata and Applications to Security (RL, AMS, AT), pp. 34–43.
- CAiSE-2003-MouratidisGM #information management #modelling #security #towards
- Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems (HM, PG, GAM), pp. 63–78.
- EDOC-2003-BurtBROA #data access #modelling #security #unification
- Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control (CCB, BRB, RRR, AMO, MA), pp. 159–173.
- EDOC-2003-DimitrakosDMJP #assessment #contract #performance
- Contract Performance Assessment for Secure and Dynamic Virtual Collaborations (TD, ID, ZM, AJ, CIP), pp. 62–75.
- ICEIS-v1-2003-AndoMKB #architecture #collaboration #database #process
- An Architecture of a Secure Database for Networked Collaborative Activities (MA, KM, MK, AB), pp. 3–10.
- ICEIS-v2-2003-HoeschlBBMRBT #security
- Structured Contextual Search for the Un Security Council (HCH, TCDB, AB, EdSM, MSR, RMB, IT), pp. 100–107.
- ICEIS-v3-2003-MouratidisMGG #information management #requirements #security #using
- Analysing Security Requirements of Information Systems Using Tropos (HM, GAM, AG, PG), pp. 623–626.
- ICEIS-v3-2003-SerraoNT #analysis #open source #operating system #security
- Open Source Security Analysis — Evaluating Security of Open Source vs. Closed Source Operating Systems (CS, DN, PT), pp. 433–440.
- ICEIS-v4-2003-BamasakZ #mobile #towards
- Towards a Secure Mobile Agent Based M-Commerce System (OB, NZ), pp. 408–412.
- ICEIS-v4-2003-BrunsDH #smarttech
- Secure Smart Card-Based Access to an E-Learning Portal (RB, JD, JvH), pp. 167–172.
- ICEIS-v4-2003-McPhersonHHK #architecture #security #web #web service #xml
- Guardian Knowledge Farm Agents and Security Architectures: Web Services, XML, and Wireless Mappings (MM, GH, BH, GK), pp. 244–253.
- ICEIS-v4-2003-Vasiu #security #trust #web #web service
- Security Web Services Based on Trust (LV), pp. 369–376.
- CIKM-2003-SmithSJFCH
- Securely sharing neuroimagery (KPS, VS, SJ, DBF, TC, JH), pp. 375–377.
- SEKE-2003-AbdullahS #framework #security #towards
- A Step toward building Dynamic Security Infrastructure (ISA, EHS), pp. 483–488.
- SEKE-2003-YuHGD #architecture #design #distributed #formal method
- Formal Software Architecture Design of Secure Distributed Systems (HY, XH, SG, YD), pp. 450–457.
- ECOOP-2003-Abadi #security
- Built-in Object Security (MA), p. 1.
- ECOOP-2003-Gunter #api #embedded #security
- Open APIs for Embedded Security (CAG), pp. 225–247.
- REFSQ-J-2002-AntonEC03 #behaviour #policy #privacy #requirements #security
- Precluding incongruous behavior by aligning software requirements with security and privacy policies (AIA, JBE, RAC), pp. 967–977.
- RE-2003-KaiyaSMK #analysis #java #mobile #policy #requirements #security #trade-off
- Trade-off Analysis between Security Policies for Java Mobile Codes and Requirements for Java Application (HK, KS, YM, KK), pp. 357–358.
- RE-2003-LinNIJM #requirements #security
- Introducing Abuse Frames for Analysing Security Requirements (LL, BN, DCI, MJ, JDM), pp. 371–372.
- RE-2003-Lipner #assurance #towards
- The Journey Toward Secure Systems: Achieving Assurance (SBL), p. 5.
- RE-2003-LiuYM #analysis #privacy #requirements #security #social
- Security and Privacy Requirements Analysis within a Social Setting (LL, ESKY, JM), pp. 151–161.
- SAC-2003-AbendrothJ #framework #security
- A Unified Security Framework for Networked Applications (JA, CDJ), pp. 351–357.
- SAC-2003-AtluriAGA #constraints #multi #security #self
- Self-Manifestation of Composite Multimedia Objects to Satisfy Security Constraints (VA, NRA, AG, IA), pp. 927–934.
- SAC-2003-YangZ #approach #data access #data flow #object-oriented
- An Approach to Secure Information Flow on Object Oriented Role-based Access Control Model (CY, CNZ), pp. 302–306.
- ICSE-2003-KemmererV #detection #internet #security
- Internet Security and Intrusion Detection (RAK, GV), pp. 748–749.
- CGO-2003-ZhangG #security #slicing
- Hiding Program Slices for Software Security (XZ, RG), pp. 325–336.
- HPDC-2003-WelchSFBCGKMPT #grid #security
- Security for Grid Services (VW, FS, ITF, JB, KC, JG, CK, SM, LP, ST), pp. 48–57.
- SOSP-2003-FuCCSV #architecture #named
- SHARP: an architecture for secure resource peering (YF, JSC, BNC, SS, AV), pp. 133–148.
- CAV-2003-BozgaLP #automation #named #protocol #security #verification
- HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols (LB, YL, MP), pp. 219–222.
- ICLP-2003-Musumbu #security #simulation
- Simulating Security Systems Based on Logigrams (KM), pp. 498–499.
- SAT-2003-ArmandoC #analysis #protocol #satisfiability #security
- Abstraction-Driven SAT-based Analysis of Security Protocols (AA, LC), pp. 257–271.
- VMCAI-2003-BossiFPR #bisimulation #security #verification
- Bisimulation and Unwinding for Verifying Possibilistic Security Properties (AB, RF, CP, SR), pp. 223–237.
- DAC-2002-RaviRPS #design #framework #security
- System design methodologies for a wireless security processing platform (SR, AR, NRP, MS), pp. 777–782.
- VLDB-2002-BettiniJWW #policy #security
- Provisions and Obligations in Policy Management and Security Applications (CB, SJ, XSW, DW), pp. 502–513.
- VLDB-2002-BouganimP #data access
- Chip-Secured Data Access: Confidential Data on Untrusted Servers (LB, PP), pp. 131–142.
- VLDB-2002-ChoALS #evaluation #optimisation #query
- Optimizing the Secure Evaluation of Twig Queries (SC, SAY, LVSL, DS), pp. 490–501.
- VLDB-2002-Vingralek #database #named
- GnatDb: A Small-Footprint, Secure Database System (RV), pp. 884–893.
- FASE-2002-BartheGH #composition #interactive #verification
- Compositional Verification of Secure Applet Interactions (GB, DG, MH), pp. 15–32.
- ICSM-2002-JiwnaniZ #maintenance #perspective #security
- Maintaining Software with a Security Perspective (KJ, MVZ), pp. 194–203.
- SAS-2002-Blanchet #authentication #protocol #security
- From Secrecy to Authenticity in Security Protocols (BB), pp. 342–359.
- SAS-2002-CorinE #constraints #protocol #security #verification
- An Improved Constraint-Based System for the Verification of Security Protocols (RC, SE), pp. 326–341.
- SAS-2002-SabelfeldM #communication #concurrent
- Securing Communication in a Concurrent Language (AS, HM), pp. 376–394.
- SAS-2002-Zanotti #abstract interpretation #security
- Security Typings by Abstract Interpretation (MZ), pp. 360–375.
- STOC-2002-CanettiLOS #composition #multi
- Universally composable two-party and multi-party secure computation (RC, YL, RO, AS), pp. 494–503.
- STOC-2002-CrepeauGS #multi #quantum
- Secure multi-party quantum computation (CC, DG, AS), pp. 643–652.
- STOC-2002-DziembowskiM #bound #proving #security
- Tight security proofs for the bounded-storage model (SD, UMM), pp. 341–350.
- ICALP-2002-IshaiK
- Perfect Constant-Round Secure Computation via Perfect Randomizing Polynomials (YI, EK), pp. 244–256.
- AdaEurope-2002-BinderL #embedded #execution #java #kernel #reliability #using
- Using a Secure Java Micro-kernel on Embedded Devices for the Reliable Execution of Dynamically Uploaded Applications (WB, BL), pp. 125–135.
- EDOC-2002-AagedalBDGRS #assessment #enterprise #modelling #risk management #security
- Model-Based Risk Assessment to Improve Enterprise Security (JØA, FdB, TD, BAG, DR, KS), p. 51–?.
- ICEIS-2002-BelsisGS #enterprise #security
- An Enterprise IT Security Data Model (MAB, ANG, LS), pp. 885–891.
- ICEIS-2002-HuangH #security
- Managing Security in Electronic Business (KH, KH), pp. 1086–1091.
- ICEIS-2002-PantiSTV #automation #protocol #security #verification
- Automatic Verification of Security in Payment Protocols for Electronic Commerce (MP, LS, ST, SV), pp. 968–974.
- ICEIS-2002-Srinivas #concept #java #network #security
- Network Security Concepts and Java (RS), p. 23.
- CIKM-2002-AvantBBFSW #security #semantics
- Semantic technology applications for homeland security (DA, MB, CB, MF, APS, YSW), pp. 611–613.
- SEKE-2002-BlundoC #authentication #named #web
- SAWM: a tool for secure and authenticated web metering (CB, SC), pp. 641–648.
- UML-2002-Jurjens #development #named #uml
- UMLsec: Extending UML for Secure Systems Development (JJ), pp. 412–425.
- UML-2002-LodderstedtBD #modelling #named #security #uml
- SecureUML: A UML-Based Modeling Language for Model-Driven Security (TL, DAB, JD), pp. 426–441.
- LOPSTR-2002-BossiFPR #data flow #proving #security
- A Proof System for Information Flow Security (AB, RF, CP, SR), pp. 199–218.
- PPDP-2002-BessonLJ #stack
- Secure calling contexts for stack inspection (FB, TdGdL, TPJ), pp. 76–87.
- POPL-2002-AbadiB #logic programming #protocol #security #source code
- Analyzing security protocols with secrecy types and logic programs (MA, BB), pp. 33–44.
- POPL-2002-HondaY #data flow
- A uniform type structure for secure information flow (KH, NY), pp. 81–92.
- RE-2002-CrookILN #anti #requirements #security
- Security Requirements Engineering: When Anti-Requirements Hit the Fan (RC, DCI, LL, BN), pp. 203–205.
- SAC-2002-Abu-GhazalehP #execution #mobile #performance #towards #verification
- Verification caching: towards efficient and secure mobile code execution environments (NBAG, DSP), pp. 964–968.
- SAC-2002-AljarehR #collaboration #multi #network #security
- A task-based security model to facilitate collaboration in trusted multi-agency networks (SA, BNR), pp. 744–749.
- SAC-2002-BarbutiBF #abstract interpretation #bytecode #java #security
- Checking security of Java bytecode by abstract interpretation (RB, CB, NDF), pp. 229–236.
- SAC-2002-Bell #interactive #policy #security #simulation
- Interactive simulation of security policies (GB), pp. 247–252.
- SAC-2002-BinderR #java #mobile #question #using
- Secure mobile agent systems using Java: where are we heading? (WB, VR), pp. 115–119.
- SAC-2002-BorealeB #analysis #automation #protocol #security
- Experimenting with STA, a tool for automatic analysis of security protocols (MB, MGB), pp. 281–285.
- SAC-2002-BurnsideCMMDR #mobile #protocol #security
- Proxy-based security protocols in networked mobile devices (MB, DEC, TM, AM, SD, RLR), pp. 265–272.
- SAC-2002-DunningR #communication #security
- Security status display and browser interframe communication (LAD, SR), pp. 237–241.
- SAC-2002-FerreiraD #embedded #mobile
- Blinded-key signatures: securing private keys embedded in mobile agents (LCF, RD), pp. 82–86.
- SAC-2002-Jurjens02a #development #using
- Using UMLsec and goal trees for secure systems development (JJ), pp. 1026–1030.
- SAC-2002-TanM #mobile #security
- Certificates for mobile code security (HKT, LM), pp. 76–81.
- SAC-2002-ThompsonWM #security #testing
- Software security vulnerability testing in hostile environments (HHT, JAW, FEM), pp. 260–264.
- FSE-2002-VetterlingWW #development
- Secure systems development based on the common criteria: the PalME project (MV, GW, AKW), pp. 129–138.
- ICSE-2002-Butler #approach #evaluation #security
- Security attribute evaluation method: a cost-benefit approach (SAB), pp. 232–240.
- HPDC-2002-Johnson #design #grid #implementation #information management
- Design and Implementation of Secured Information Services for the ASCI Grid (WRJ), pp. 209–214.
- HPDC-2002-XieOR #distributed
- A Secure Distributed Search System (YX, DRO, MKR), p. 321–?.
- OSDI-2002-CastroDGRW #network #peer-to-peer
- Secure Routing for Structured Peer-to-Peer Overlay Networks (MC, PD, AJG, AITR, DSW), pp. 299–314.
- CAV-2002-ArmandoBBCCMRTVV #analysis #protocol #security
- The AVISS Security Protocol Analysis Tool (AA, DAB, MB, YC, LC, SM, MR, MT, LV, LV), pp. 349–353.
- CAV-2002-ChevalierV #automation #bound #protocol #security #verification
- Automated Unbounded Verification of Security Protocols (YC, LV), pp. 324–337.
- ICLP-2002-JamilD #database #deduction #multi #semantics
- A Model Theoretic Semantics for Multi-level Secure Deductive Databases (HMJ, GD), pp. 130–147.
- RTA-2002-Mitchell #analysis #multi #protocol #security
- Multiset Rewriting and Security Protocol Analysis (JCM), pp. 19–22.
- VMCAI-2002-BernardeschiF #abstract interpretation #bytecode #java #model checking #security
- Combining Abstract Interpretation and Model Checking for Analysing Security Properties of Java Bytecode (CB, NDF), pp. 1–15.
- VMCAI-2002-FocardiPR #bisimulation #data flow #proving #security
- Proofs Methods for Bisimulation Based Information Flow Security (RF, CP, SR), pp. 16–31.
- ASE-2001-ChevalierV #lazy evaluation #protocol #security #verification
- A Tool for Lazy Verification of Security Protocols (YC, LV), pp. 373–376.
- ASE-2001-Fenkam #security #specification #verification
- Security Specification and Verification (PF), p. 434.
- ASE-2001-Hall #modelling #network #product line #security #specification #validation
- Specification Modeling and Validation Applied to a Family of Network Security Products (RJH), pp. 71–80.
- ESOP-2001-Laud #data flow #program analysis #semantics
- Semantics and Program Analysis of Computationally Secure Information Flow (PL), pp. 77–91.
- ESOP-2001-Mitchell #analysis #calculus #polynomial #probability #process #protocol #security
- Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis (JCM), pp. 23–29.
- ESOP-2001-ZdancewicM #continuation #data flow
- Secure Information Flow and CPS (SZ, ACM), pp. 46–61.
- FASE-2001-Jurjens #development #towards #using
- Towards Development of Secure Systems Using UMLsec (JJ), pp. 187–200.
- SCAM-2001-WeberSR #case study #constraints #detection #optimisation #security #using
- A Case Study in Detecting Software Security Vulnerabilities Using Constraint Optimization (MW, VS, CR), pp. 3–13.
- WCRE-2001-CifuentesWE #analysis #debugging #decompiler #security
- Computer Security Analysis through Decompilation and High-Level Debugging (CC, TW, MVE), pp. 375–380.
- PLDI-2001-AmmeDFR #named #representation #type safety
- SafeTSA: A Type Safe and Referentially Secure Mobile-Code Representation Based on Static Single Assignment Form (WA, ND, MF, JvR), pp. 137–147.
- SAS-2001-GordonJ #analysis #protocol #security
- A Type and Effect Analysis of Security Protocols (ADG, AJ), p. 432.
- SAS-2001-Myers #distributed
- Security-Typed Languages and Distributed Computation (ACM), pp. 437–438.
- SAS-2001-Schneider #security #what #why
- Language-Based Security: What’s Needed and Why (FBS), p. 374.
- STOC-2001-GennaroIKR #complexity #multi
- The round complexity of verifiable secret sharing and secure multicast (RG, YI, EK, TR), pp. 580–589.
- STOC-2001-NaorN #communication #evaluation #protocol
- Communication preserving protocols for secure function evaluation (MN, KN), pp. 590–599.
- FLOPS-2001-Delzanno #case study #debugging #prolog #protocol #security #specification
- Specifying and Debugging Security Protocols via Hereditary Harrop Formulas and λ Prolog — A Case-study (GD), pp. 123–137.
- ICALP-2001-FeigenbaumIMNSW #approximate #multi
- Secure Multiparty Computation of Approximations (JF, YI, TM, KN, MS, RNW), pp. 927–938.
- ICALP-2001-KiayiasY #game studies #polynomial
- Secure Games with Polynomial Expressions (AK, MY), pp. 939–950.
- ICEIS-v2-2001-MartinCLG #e-commerce #policy #security
- Planning Security Policy on E-Commerce (MM, AC, JL, RG), pp. 915–919.
- CIKM-2001-Rosenthal #documentation #question #security #what
- What Can Researches Do to Improve Security of Data and Documents? (AR), p. 593.
- ECOOP-2001-CaromelV #component #java #security
- Reflections on MOPs, Components, and Java Security (DC, JV), pp. 256–274.
- TOOLS-USA-2001-McClure #how #privacy #security
- Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available (SM), p. 7.
- LOPSTR-2001-DelzannoE #debugging #logic programming #protocol #proving #security
- Proof Theory, Transformations, and Logic Programming for Debugging Security Protocols (GD, SE), pp. 76–90.
- PADL-2001-Barker #database #deduction
- Secure Deductive Databases (SB), pp. 123–137.
- PADL-2001-BellaB #analysis #constraints #protocol #security
- Soft Constraints for Security Protocol Analysis: Confidentiality (GB, SB), pp. 108–122.
- POPL-2001-AbadiF #communication #mobile
- Mobile values, new names, and secure communication (MA, CF), pp. 104–115.
- POPL-2001-BugliesiC
- Secure safe ambients (MB, GC), pp. 222–235.
- POPL-2001-Mitchell #programming language #security
- Programming language methods in computer security (JCM), pp. 1–3.
- RE-2001-Hall01a #modelling #network #security #specification #validation
- Specification Modeling and Validation Applied to Network Security Gateways (RJH), pp. 289–291.
- RE-2001-Spafford #privacy #security
- The Hidden Meta-Requirements of Security and Privacy (EHS), p. 10.
- SAC-2001-VuongSD #distributed #policy #security #using #xml
- Managing security policies in a distributed environment using eXtensible markup language (XML) (NNV, GS, YD), pp. 405–411.
- ESEC-FSE-2001-BasinRV #corba #security
- A formal data-model of the CORBA security service (DAB, FR, LV), pp. 303–304.
- HPDC-2001-HumphreyT #grid #security
- Security Implications of Typical Grid Computing Usage Scenarios (MH, MRT), pp. 95–103.
- HPDC-2001-JohnstonTJ #bibliography #security
- Overview of Security Considerations for Computational and Data Grids (WEJ, ST, KRJ), pp. 439–440.
- SOSP-2001-ZdancewicZNM #clustering
- Untrusted Hosts and Confidentiality: Secure Program Partitioning (SZ, LZ, NN, ACM), pp. 1–14.
- CAV-2001-SongPP #automation #generative #implementation #named #protocol #security #verification
- AGVI — Automatic Generation, Verification, and Implementation of Security Protocols (DXS, AP, DP), pp. 241–245.
- LICS-2001-MitchellRST #analysis #calculus #probability #process #protocol #security
- Probabilistic Polynominal-Time Process Calculus and Security Protocol Analysis (JCM, AR, AS, VT), pp. 3–5.
- ASE-2000-LiuR #automation #security #using
- Automated Security Checking and Patching Using TestTalk (CL, DJR), pp. 261–264.
- ESOP-2000-HondaVY #behaviour #data flow #process
- Secure Information Flow as Typed Process Behaviour (KH, VTV, NY), pp. 180–199.
- TACAS-2000-BenerecettiG #logic #model checking #protocol #security #using
- Model Checking Security Protocols Using a Logic of Belief (MB, FG), pp. 519–534.
- TACAS-2000-ClarkeJM #partial order #protocol #reduction #security #verification
- Partial Order Reductions for Security Protocol Verification (EMC, SJ, WRM), pp. 503–518.
- WRLA-2000-BasinD #analysis #comparison #haskell #maude #protocol #security
- Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis (DAB, GD), pp. 235–256.
- STOC-2000-BihamBBMR #proving #quantum #security
- A proof of the security of quantum key distribution (extended abstract) (EB, MB, POB, TM, VPR), pp. 715–724.
- STOC-2000-KatzY #encryption #probability #security
- Complete characterization of security notions for probabilistic private-key encryption (JK, MY), pp. 245–254.
- STOC-2000-Kilian #theorem
- More general completeness theorems for secure two-party computation (JK), pp. 316–324.
- ICALP-2000-AlonKKMS #scalability
- Scalable Secure Storage when Half the System Is Faulty (NA, HK, MK, DM, JPS), pp. 576–587.
- ICALP-2000-BaudronPS #multi #security
- Extended Notions of Security for Multicast Public Key Cryptosystems (OB, DP, JS), pp. 499–511.
- ICALP-2000-CachinCKM #mobile
- One-Round Secure Computation and Secure Autonomous Mobile Agents (CC, JC, JK, JM), pp. 512–523.
- WLC-2000-YamamuraK #protocol
- Key Agreement Protocol Securer than DLOG (AY, KK), pp. 450–465.
- ICFP-2000-SkalkaS #security
- Static enforcement of security with types (CS, SFS), pp. 34–45.
- CAiSE-2000-LiuLW #named #security
- CHAOS: An Active Security Mediation System (DL, KHL, GW), pp. 232–246.
- ICEIS-2000-Barker #approach #logic #security
- Information Security: A Logic Based Approach (SB), pp. 9–14.
- ICEIS-2000-HeL #protocol #towards
- Towards a Secure and Complete Protocol for Electronic Commerce (RH, KL), pp. 435–441.
- ECOOP-2000-Gong #security
- Developing Security Systems in the Real World (LG), p. 251.
- TOOLS-ASIA-2000-KhanHZ #component #composition #security
- Security Characterization of Software Components and Their Composition (KMK, JH, YZ), pp. 240–249.
- TOOLS-ASIA-2000-TaoJY #adaptation #mobile #modelling #network #research #security #self
- The Research on Dynamic Self-Adaptive Network Security Model Based on Mobile Agent (JT, LJr, QY), pp. 134–139.
- TOOLS-ASIA-2000-XingsheX #corba #design #implementation #security
- Design and Implementation of CORBA Security Service (XZ, XL), pp. 140–147.
- TOOLS-EUROPE-2000-Macaire #framework
- An Open and Secure Terminal Infrastructure for Hosting Personal Services (AM), pp. 10–21.
- TOOLS-PACIFIC-2000-SindreO #case study #elicitation #requirements #security
- Eliciting Security Requirements by Misuse Cases (GS, ALO), pp. 120–131.
- TOOLS-USA-2000-MegaacheKJ #architecture #security
- A Role-Based Security Architecture for Business Intelligence (SM, TK, GRRJ), pp. 295–306.
- POPL-2000-Walker #policy #security #type system
- A Type System for Expressive Security Policies (DW), pp. 254–267.
- FoSE-2000-DevanbuS #re-engineering #roadmap #security
- Software engineering for security: a roadmap (PTD, SGS), pp. 227–239.
- LCTES-2000-JeongKL #concurrent #multi #realtime #using
- Optimistic Secure Real-Time Concurrency Control Using Multiple Data Version (BSJ, DK, SL), pp. 33–47.
- OSDI-2000-FuKM #distributed #file system #performance
- Fast and Secure Distributed Read-Only File System (KF, MFK, DM), pp. 181–196.
- OSDI-2000-StrunkGSSG #self
- Self-Securing Storage: Protecting Data in Compromised Systems (JDS, GRG, MLS, CANS, GRG), pp. 165–180.
- WICSA-1999-Butler #security
- Security Issues with the Global Command and Control System (GCCS) (SAB), pp. 407–422.
- ICDAR-1999-UrecheP #aspect-oriented #documentation #security
- Document Transport, Transfer, and Exchange: Security and Commercial Aspects (OU, RP), pp. 585–588.
- CSEET-1999-FrewMBA #re-engineering #security
- Software Engineering and Security Engineering — An Argument for Merger (panel) (BF, TM, JEBI, MDA), p. 74–?.
- ESOP-1999-SabelfeldS #data flow #source code
- A Per Model of Secure Information Flow in Sequential Programs (AS, DS), pp. 40–58.
- FoSSaCS-1999-Abadi #protocol #security #specification
- Security Protocols and Specifications (MA), pp. 1–13.
- WCRE-1999-SouderM #distributed #legacy
- A Tool for Securely Integrating Legacy Systems into a Distributed Environment (TSS, SM), pp. 47–55.
- STOC-1999-CanettiO #what
- Secure Computation with Honest-Looking Parties: What If Nobody Is Truly Honest? (Extended Abstract) (RC, RO), pp. 255–264.
- STOC-1999-CrescenzoI
- Security-Preserving Hardness-Amplification for Any Regular One-Way Function (GDC, RI), pp. 169–178.
- FM-v1-1999-FocardiM #approach #security
- A Uniform Approach for the Definition of Security Properties (RF, FM), pp. 794–813.
- FM-v1-1999-GilhamRS #database #distributed
- Secure Interoperation of Secure Distributed Databases (FG, RAR, VS), pp. 701–717.
- FM-v1-1999-LincolnMMS #analysis #equivalence #polynomial #probability #security
- Probabilistic Polynomial-Time Equivalence and Security Analysis (PL, JCM, MM, AS), pp. 776–793.
- FM-v1-1999-LotzKW #hardware #security
- A Formal Security Model for Microprocessor Hardware (VL, VK, GW), pp. 718–737.
- FM-v1-1999-ZhouC #analysis #communication #formal method #protocol
- Formal Analysis of a Secure Communication Channel: Secure Core-Email Protocol (DZ, SKC), pp. 758–775.
- FM-v2-1999-GarbettPSA #empirical #process #synthesis
- Secure Synthesis of Code: A Process Improvement Experiment (PG, JPP, MS, SA), pp. 1816–1835.
- HCI-EI-1999-Grinchenko #internet #quality #security
- Quality of Information in Internet as an Information Security Basis (TAG), pp. 111–115.
- CAiSE-1999-KangFSKM #multi #workflow
- A Multilevel Secure Workflow Management System (MHK, JNF, APS, KK, JAM), pp. 271–285.
- SAC-1999-DavisE #encryption #named #web
- Emperor: Cheap Legal Secure Cryptography for the Web (CD, CFE), pp. 603–609.
- SAC-1999-Haraty #case study #comparative #database
- C2 Secure Database Management Systems — A Comparative Study (RAH), pp. 216–220.
- SAC-1999-RowMAW #linux #network #security
- Security Issues in Small Linux Networks (WMR, DJM, BLA, AHW), pp. 506–510.
- LCTES-1999-LeeJS #database #protocol #realtime
- A Secure Dynamic Copy Protocol in Real-Time Secure Database Systems (SL, BSJ, HS), pp. 73–79.
- SOSP-1999-MazieresKKW #file system #security
- Separating key management from file system security (DM, MK, MFK, EW), pp. 124–139.
- CADE-1999-Weidenbach #analysis #automation #first-order #logic #protocol #security #towards
- Towards an Automatic Analysis of Security Protocols in First-Order Logic (CW), pp. 314–328.
- LICS-1999-MalacariaH #game studies #nondeterminism #program analysis #security
- Non-Deterministic Games and Program Analysis: An Application to Security (PM, CH), pp. 443–452.
- LICS-1999-Paulson #protocol #proving #security
- Proving Security Protocols Correct (LCP), pp. 370–381.
- DAC-1998-HauckK #security
- Data Security for Web-based CAD (SH, SK), pp. 788–793.
- DATE-1998-CoppensAR #analysis #fault #modelling
- VHDL Modelling and Analysis of Fault Secure Systems (JC, DAK, CR), pp. 148–152.
- DATE-1998-NicolaidisD #design #multi #predict
- Design of Fault-Secure Parity-Prediction Booth Multipliers (MN, RdOD), pp. 7–14.
- SIGMOD-1998-GodfreySE #database
- Secure and Portable Database Extensibility (MWG, TM, PS, TvE), pp. 390–401.
- VLDB-1998-GeorgeH #database #realtime
- Secure Buffering in Firm Real-Time Database Systems (BG, JRH), pp. 464–475.
- ITiCSE-1998-MayoK #kernel #programming
- A secure networked laboratory for kernel programming (JM, PK), pp. 175–177.
- FM-1998-KoobUW #formal method #modelling #policy #process #security #topic #using
- The New Topicality of Using Formal Models of Security Policy within the Security Engineering Process (FK, MU, SW), pp. 302–310.
- SIGAda-1998-MichellSW #safety #security
- Looking into Safety with the Safety and Security Rapporteur Group (SM, MS, BAW), pp. 7–11.
- ICPR-1998-TirkelSHO #array
- Secure arrays for digital watermarking (AZT, RGvS, TEH, CFO), pp. 1643–1645.
- KDD-1998-LaneB #concept #identification #learning #online #security
- Approaches to Online Learning and Concept Drift for User Identification in Computer Security (TL, CEB), pp. 259–263.
- POPL-1998-LeroyR #security
- Security Properties of Typed Applets (XL, FR), pp. 391–403.
- POPL-1998-SmithV #concurrent #data flow #imperative #multi #thread
- Secure Information Flow in a Multi-Threaded Imperative Language (GS, DMV), pp. 355–364.
- HPDC-1998-ForslundGG #collaboration #corba #java #named
- TeleMed: Wide-Area, Secure, Collaborative Object Computing with Java and CORBA for Healthcare (DWF, JEG, EMG), pp. 30–33.
- CAV-1998-HoffmanP #experience #formal method
- A Formal Method Experience at Secure Computing Corporation (JH, CP), pp. 49–56.
- CAV-1998-Mitchell #analysis #finite #protocol #security
- Finite-State Analysis of Security Protocols (JCM), pp. 71–76.
- LICS-1998-AbadiFG #abstraction #implementation
- Secure Implementation of Channel Abstractions (MA, CF, GG), pp. 105–116.
- EDTC-1997-DuarteNBZ #design #implementation
- Fault-secure shifter design: results and implementations (RdOD, MN, HB, YZ), pp. 335–341.
- SIGMOD-1997-GeorgeH #database #realtime #transaction
- Secure Transaction Processing in Firm Real-Time Database Systems (BG, JRH), pp. 462–473.
- ICSM-2000-BasharKKSW #security #tool support
- Low-threat security patches and tools (MAB, GK, MGK, EHS, SSWJ), pp. 306–313.
- HCI-SEC-1997-HondaKTOOM
- A Virtual Office Environment for Supporting Informal Communications and Securing Personal Space (SH, TK, HT, TO, KiO, YM), pp. 909–912.
- SAC-1997-Panda #approach #multi #transaction
- An alternative approach to serialization of multilevel secure Transactions (BP), pp. 134–135.
- ESEC-FSE-1997-Kemmerer #distributed #security
- Security Issues in Distributed Software (RAK), pp. 52–59.
- ICSE-1997-Hefner #lessons learnt #maturity #security
- Lessons Learned with the Systems Security Engineering Capability Maturity Model (RH), pp. 566–567.
- HPDC-1997-FosterKKKT #distributed #framework
- A Secure Communications Infrastructure for High-Performance Distributed Computing (ITF, NTK, CK, GK, ST), pp. 125–136.
- SOSP-1997-WallachBDF #architecture #java #security
- Extensible Security Architecture for Java (DSW, DB, DD, EWF), pp. 116–128.
- SIGMOD-1996-Tajima #database #detection #object-oriented #security #static analysis
- Static Detection of Security Flaws in Object-Oriented Databases (KT), pp. 341–352.
- TACAS-1996-FocardiG #automation #composition #security #verification
- Automatic Compositional Verification of Some Security Properties (RF, RG), pp. 167–186.
- STOC-1996-CanettiFGN #adaptation #multi
- Adaptively Secure Multi-Party Computation (RC, UF, OG, MN), pp. 639–648.
- FME-1996-BrookesFL #case study #comparative #component #specification
- Formal and Informal Specifications of a Secure System Component: Final Results in a Comparative Study (TMB, JSF, PGL), pp. 214–227.
- AdaEurope-1996-KienzleWS #ada #communication #distributed
- Secure Communication in Distributed Ada (JK, TW, AS), pp. 198–210.
- AKDDM-1996-ApteH #predict
- Predicting Equity Returns from Securities Data (CA, SJH), pp. 541–560.
- SAC-1996-McBride #security
- Security considerations for active messages (RAM), pp. 463–467.
- STOC-1995-BellareR
- Provably secure session key distribution: the three party case (MB, PR), pp. 57–66.
- STOC-1995-FranklinY #privacy
- Secure hypergraphs: privacy from partial broadcast (Extended Abstract) (MKF, MY), pp. 36–44.
- STOC-1995-Yao #metric #protocol #quantum #security
- Security of quantum protocols against coherent measurements (ACCY), pp. 67–75.
- VLDB-1994-IdrisGC #database #security
- Providing Dynamic Security Control in a Federated Database (NBI, WAG, RFC), pp. 13–23.
- VLDB-1994-JonscherD #approach #database
- An Approach for Building Secure Database Federations (DJ, KRD), pp. 24–35.
- STOC-1994-FeigeKN
- A minimal model for secure computation (extended abstract) (UF, JK, MN), pp. 554–563.
- STOC-1994-SantisDFY #how
- How to share a function securely (ADS, YD, YF, MY), pp. 522–533.
- FME-1994-Cherkaoui #analysis #security #specification
- Specification and Analysis of a Security Management System (OC), pp. 66–82.
- FME-1994-FitzgeraldBGL #case study #comparative #component #specification
- Formal and Informal Specifications of a Secure System Component: first results in a comparative study (JSF, TMB, MAG, PGL), pp. 35–44.
- TRI-Ada-1994-Aldrich #ada #architecture
- Secured Systems and Ada: A Trusted System Software Architecture (MA), pp. 282–292.
- CAiSE-1994-HofmannH #design #information management #quality #requirements #security
- Reaching out for Quality: Considering Security Requirements in the Design of Information Systems (HFH, RH), pp. 105–118.
- CIKM-1994-PissinouMP #framework #modelling #multi #towards
- Towards a Framework for Integrating Multilevel Secure Models and Temporal Data Models (NP, KM, EKP), pp. 280–287.
- KDD-1994-ApteH #generative #predict
- Predicting Equity Returns from Securities Data with Minimal Rule Generation (CA, SJH), pp. 407–418.
- SAC-1994-ChangGVWO #empirical #reuse #security #social
- A reuse experiment in the social security sector (SCC, APMG, HvV, EW, HO), pp. 94–98.
- SAC-1994-PandaPH #database #multi #query #transaction
- Secure transaction management and query processing in multilevel secure database systems (BP, WP, RAH), pp. 363–368.
- DAC-1993-KarriO #architecture #synthesis
- High-Level Synthesis of Fault-Secure Microarchitectures (RK, AO), pp. 429–433.
- STOC-1993-Ben-OrCG
- Asynchronous secure computation (MBO, RC, OG), pp. 52–61.
- ICALP-1993-FranklinY #performance
- Secure and Efficient Off-Line Digital Money (Extended Abstract) (MKF, MY), pp. 265–276.
- FME-1993-Boswell #policy #security #specification #validation
- Specification and Validation of a Security Policy Model (AB), pp. 42–51.
- CAiSE-1993-Chung #development #information management #requirements #security
- Dealing with Security Requirements During the Development of Information Systems (LC), pp. 234–251.
- CIKM-1993-Anderson #approach #database #deduction #knowledge base #multi #problem #statistics
- A Dynamic Knowledge Based Approach to the Problem of Deduction in a Non-Statistical Multilevel Secure Database (MA), pp. 154–163.
- CIKM-1993-Maine #bound #named #performance
- HSGIMS — A Secure High-Speed Tool with Bound Search Times for Transparently Managing and Manipulating Information (PADdM), pp. 216–222.
- TOOLS-EUROPE-1993-DollimoreX #security
- The Private Access Channel: A Security Mechanism for Shared Distribution Objects (JD, WX), pp. 211–221.
- STOC-1992-FranklinY #communication #complexity
- Communication Complexity of Secure Computation (Extended Abstract) (MKF, MY), pp. 699–710.
- TRI-Ada-C-1992-McHugh #ada #safety
- Ada 9X and Safety Critical/Secure Systems (JM), pp. 55–59.
- SOSP-WIP-1991-Reiter92 #distributed #security
- Integrating Security in a Group Oriented Distributed System (Abstract) (MKR), p. 27.
- SIGMOD-1991-JajodiaS #multi #relational #towards
- Towards a Multilevel Secure Relational Data Model (SJ, RSS), pp. 50–59.
- STOC-1991-Maurer #encryption #independence #security
- Perfect Cryptographic Security from Partially Independent Channels (UMM), pp. 561–571.
- VDME-1991-1-SmithK #development #transaction
- The Formal Development of a Secure Transaction Mechanism (PS, RK), pp. 457–476.
- KDD-1991-OLeary #database #information management #security
- Knowledge Discovery as a Threat to Database Security (DEO), pp. 507–516.
- ICSE-1991-Jahl #evaluation #security
- The Information Technology Security Evaluation Criteria (CJ), pp. 306–312.
- SIGMOD-1990-KoganJ #architecture #concurrent #database #multi
- Concurrency Control in Multilevel-Secure Databases Based on Replicated Architecture (BK, SJ), pp. 153–162.
- STOC-1990-BeaverMR #complexity #protocol
- The Round Complexity of Secure Protocols (Extended Abstract) (DB, SM, PR), pp. 503–513.
- STOC-1990-NaorY
- Public-key Cryptosystems Provably Secure against Chosen Ciphertext Attacks (MN, MY), pp. 427–437.
- STOC-1990-Rompel
- One-Way Functions are Necessary and Sufficient for Secure Signatures (JR), pp. 387–394.
- OOPSLA-1989-Thuraisingham #database #object-oriented #security
- Mandatory Security in Object-Oriented Database Systems (BMT), pp. 203–210.
- SIGMOD-1988-MazumdarSS #proving #security #theorem proving #using
- Resolving the Tension between Integrity and Security Using a Theorem Prover (SM, DWS, TS), pp. 233–242.
- STOC-1988-ChaumCD #multi #protocol
- Multiparty Unconditionally Secure Protocols (Extended Abstract) (DC, CC, ID), pp. 11–19.
- SIGMOD-1987-Morgenstern #database #knowledge base #multi #security
- Security and Inference in Multilevel Database and Knowledge-Base Systems (MM), pp. 357–373.
- VLDB-1986-SpoonerKWSH #ada #component #framework #security
- Framework for the Security Component of an Ada DBMS (DLS, AMK, GW, JS, DH), pp. 347–354.
- STOC-1986-Cleve #security
- Limits on the Security of Coin Flips when Half the Processors Are Faulty (Extended Abstract) (RC), pp. 364–369.
- STOC-1985-HastadS #encryption #security
- The Cryptographic Security of Truncated Linearly Related Variables (JH, AS), pp. 356–362.
- STOC-1983-Ben-OrCS #encryption #on the #security
- On the Cryptographic Security of Single RSA Bits (MBO, BC, AS), pp. 421–430.
- POPL-1983-Strom #security
- Mechanisms for Compile-Time Enforcement of Security (RES), pp. 276–284.
- SOSP-1983-Silverman #kernel #operating system #security #verification
- Reflections on the Verification of the Security of an Operating System Kernel (JMS), pp. 143–154.
- VLDB-1981-BussolatiM #approach #database #modelling #security
- A Database Approach to Modelling and Managing Security Information (UB, GM), pp. 532–542.
- SOSP-1981-Rushby #design #verification
- Design and Verification of Secure Systems (JMR), pp. 12–21.
- SOSP-J-1979-WalkerKP80 #kernel #security #specification #verification
- Specification and Verification of the UCLA Unix Security Kernel (BJW, RAK, GJP), pp. 118–131.
- VLDB-1979-DownsP #database #security
- Data Base Management Systems Security and INGRES (DD, GJP), pp. 280–290.
- SOSP-1979-WalkerKP #kernel #security #specification #verification
- Specification and Verification of the UCLA Unix Security Kernel (Extended Abstract) (BJW, RAK, GJP), pp. 64–65.
- VLDB-1978-Davida #privacy #security
- Security and Privacy (GID), p. 54.
- VLDB-1978-HsiaoKM #database #privacy #security
- Privacy and Security of Data Communications and Data Bases (DKH, DSK, SEM), pp. 55–67.
- VLDB-1977-DownsP #database #design #kernel
- A Kernel Design for a Secure Data Base Management System (DD, GJP), pp. 507–514.
- SOSP-1977-FeiertagLR #design #multi #proving #security
- Proving Multilevel Security of a System Design (RJF, KNL, LR), pp. 57–65.
- ICSE-1976-Hsiao #design #experience #implementation #re-engineering
- A Software Engineering Experience in the Management, Design and Implementation of A Data Secure System (DKH), pp. 532–538.
- ICSE-1976-NeumannFLR #development #multi #proving #security
- Software Development and Proofs of Multi-Level Security (PGN, RJF, KNL, LR), pp. 421–428.
- SOSP-J-1975-Denning76 #data flow
- A Lattice Model of Secure Information Flow (DED), pp. 236–243.
- SOSP-J-1975-Millen76 #kernel #security #validation
- Security Kernel Validation in Practice (JKM), pp. 243–250.
- SOSP-1975-JonesL #policy #security
- The Enforcement of Security Policies for Computation (AKJ, RJL), pp. 197–206.
- SOSP-1975-Schroeder #kernel #multi #security
- Engineering a Security Kernel for Multics (MDS), pp. 25–32.