Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Nadira Lammari, Jean-Sylvain Bucumi, Jacky Akoka, Isabelle Comyn-Wattiau |
A conceptual meta-model for secured information systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, pp. 22-28, 2011, ACM, 978-1-4503-0581-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Fabio Martinelli, Ilaria Matteucci |
Preserving security properties under refinement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, pp. 15-21, 2011, ACM, 978-1-4503-0581-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | KiSeok Bae, MahnKi Ahn, Hoon-Jae Lee 0001, JaeCheol Ha, Sang-Jae Moon |
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, pp. 50-56, 2011, ACM, 978-1-4503-0581-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yonghee Shin, Laurie A. Williams |
An initial study on the use of execution complexity metrics as indicators of software vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, pp. 1-7, 2011, ACM, 978-1-4503-0581-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Michele Co, Jack W. Davidson, Jason D. Hiser, John C. Knight, Anh Nguyen-Tuong, David R. Cok, Denis Gopan, David Melski, Wenke Lee, Chengyu Song, Thomas Bracewell, David Hyde 0002, Brian Mastropietro |
PEASOUP: preventing exploits against software of uncertain provenance (position paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, pp. 43-49, 2011, ACM, 978-1-4503-0581-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jan Jürjens, Seok-Won Lee, Mattia Monga (eds.) |
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![ACM, 978-1-4503-0581-5 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
1 | Michael Todd Gamble, Rose F. Gamble, Matthew L. Hale |
Security policy foundations in context UNITY. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, pp. 8-14, 2011, ACM, 978-1-4503-0581-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Koen Buyens, Riccardo Scandariato, Wouter Joosen |
Composition of least privilege analysis results in software architectures (position paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, pp. 29-35, 2011, ACM, 978-1-4503-0581-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Naved Ahmed, Raimundas Matulevicius |
Towards transformation guidelines from secure tropos to misuse cases (position paper). ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, SESS 2011, Waikiki, Honolulu, HI, USA, May 22, 2011, pp. 36-42, 2011, ACM, 978-1-4503-0581-5. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shamal Faily, Ivan Flechais |
A meta-model for usable secure requirements engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 29-35, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sven Lachmund |
Auto-generating access control policies for applications by static analysis with user input recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 8-14, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Seok-Won Lee, Mattia Monga, Jan Jürjens (eds.) |
ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![ACM, 978-1-60558-965-7 The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP BibTeX RDF |
|
1 | Yan Wu 0018, Robin A. Gandhi, Harvey P. Siy |
Using semantic templates to study vulnerabilities recorded in large software repositories. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 22-28, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tanveer Mustafa, Michael Drouineaud, Karsten Sohr |
Towards formal specification and verification of a role-based authorization engine using JML. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 50-57, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Markus Luckey, Andrea Baumann, Daniel Méndez Fernández, Stefan Wagner 0001 |
Reusing security requirements using an extended quality model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 1-7, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Angelo Ciampa, Corrado Aaron Visaggio, Massimiliano Di Penta |
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 43-49, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | David Byers, Nahid Shahmehri |
Unified modeling of attacks, vulnerabilities and security activities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 36-42, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jianning Geng, Lin Liu 0001, Barrett R. Bryant |
Towards a personalized privacy management framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 58-64, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Al-Azzani, Rami Bahsoon |
Using implied scenarios in security testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 15-21, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Avancini, Mariano Ceccato |
Towards security testing with taint analysis and genetic algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa, pp. 65-71, 2010, ACM, 978-1-60558-965-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hossain Shahriar, Mohammad Zulkernine |
MUTEC: Mutation-based testing of Cross Site Scripting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 47-53, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Munawar Hafiz, Ralph E. Johnson |
Improving perimeter security with security-oriented program transformations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 61-67, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Hrvoje Belani, Zeljka Car, Antun Caric |
RUP-based process model for security requirements engineering in value-added service development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 54-60, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peter Würzinger, Christian Platzer, Christian Ludl, Engin Kirda, Christopher Kruegel |
SWAP: Mitigating XSS attacks using a reverse proxy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 33-39, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David S. Allison, Hany F. El Yamany, Miriam A. M. Capretz |
Metamodel for privacy policies within SOA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 40-46, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | |
ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![IEEE Computer Society, 978-1-4244-3725-2 The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP BibTeX RDF |
|
1 | Mattia Monga, Roberto Paleari, Emanuele Passerini |
A hybrid analysis framework for detecting web application vulnerabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 25-32, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Koen Buyens, Bart De Win, Wouter Joosen |
Resolving least privilege violations in software architectures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 9-16, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Nina Moebius, Kurt Stenzel, Wolfgang Reif |
Generating formal specifications for security-critical applications - A model-driven approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 68-74, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | David Garcia Rosado, Eduardo Fernández-Medina, Javier López 0001 |
Reusable security use cases for mobile grid environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 1-8, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Marwa El-Ghali, Wes Masri |
Intrusion detection using signatures extracted from execution profiles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: ICSE Workshop on Software Engineering for Secure Systems, SESS 2009, Vancouver, BC, Canada, May 19, 2009, pp. 17-24, 2009, IEEE Computer Society, 978-1-4244-3725-2. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Linzhang Wang, W. Eric Wong, Dianxiang Xu |
A Threat Model Driven Approach for Security Testing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 10, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Heyman, Koen Yskout, Riccardo Scandariato, Wouter Joosen |
An Analysis of the Security Patterns Landscape. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 3, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Raffetseder, Engin Kirda, Christopher Kruegel |
Building Anti-Phishing Browser Plug-Ins: An Experience Report. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 6, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Dries Vanoverberghe, Frank Piessens |
Supporting Security Monitor-Aware Development. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 2, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Kun Xiao, Nianen Chen, Shangping Ren, Limin Shen, Xianhe Sun, Kevin A. Kwiat, Michael Macalik |
A Workflow-Based Non-intrusive Approach for Enhancing the Survivability of Critical Infrastructures in Cyber Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 4, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | |
Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![IEEE Computer Society, 0-7695-2952-6 The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
1 | Stephen Thomas, Laurie A. Williams |
Using Automated Fix Generation to Secure SQL Statements. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 9, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Johan Grégoire, Koen Buyens, Bart De Win, Riccardo Scandariato, Wouter Joosen |
On the Secure Software Development Process: CLASP and SDL Compared. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 1, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Seok Won Lee, Robin A. Gandhi, Siddharth J. Wagle |
Towards a Requirements-Driven Workbench for Supporting Software Certification and Accreditation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 8, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Lanzi, Lorenzo Martignoni, Mattia Monga, Roberto Paleari |
A Smart Fuzzer for x86 Executables. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 7, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Evan Martin, Tao Xie 0001 |
Automated Test Generation for Access Control Policies via Change-Impact Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Third International Workshop on Software Engineering for Secure Systems, SESS 2007, Minneapolis, MN, USA, May 20-26, 2007, pp. 5, 2007, IEEE Computer Society, 0-7695-2952-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
1 | Bart De Win, Frank Piessens, Wouter Joosen |
How secure is AOP and what can we do about it? ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 27-34, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Bruschi, Bart De Win, Mattia Monga (eds.) |
Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![ACM, 1-59593-411-1 The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
1 | Danilo Bruschi, Bart De Win, Mattia Monga |
Introduction to software engineering for secure systems: SESS06 - secure by design. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 1-2, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Marco Rolando, Matteo Rossi 0001, Niccolò Sanarico, Dino Mandrioli |
A formal approach to sensor placement and configuration in a network intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 65-71, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Gustav Boström, Jaana Wäyrynen, Marine Bodén, Konstantin Beznosov, Philippe Kruchten |
Extending XP practices to support security requirements engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 11-18, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Seok Won Lee, Robin A. Gandhi, Divya Muthurajan, Deepak S. Yavagal, Gail-Joon Ahn |
Building problem domain ontology from security requirements in regulatory documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 43-50, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shin Nakajima 0001, Tetsuo Tamai |
Formal specification and analysis of JAAS framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 59-64, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Kung Chen, Ju-Bing Chen |
On instrumenting obfuscated java bytecode with aspects. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 19-26, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Charles B. Haley, Jonathan D. Moffett, Robin C. Laney, Bashar Nuseibeh |
A framework for security requirements engineering. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 35-42, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Shanai Ardi, David Byers, Nahid Shahmehri |
Towards a structured unified process for software security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 3-10, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Martin Naedele, Thomas E. Koch |
Trust and tamper-proof software delivery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2006 international workshop on Software engineering for secure systems, SESS 2006, Shanghai, China, May 20-21, 2006, pp. 51-58, 2006, ACM, 1-59593-411-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
1 | Sam Weber, Paul A. Karger, Amit M. Paradkar |
A software flaw taxonomy: aiming tools at security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Michael Gegick, Laurie A. Williams |
Matching attack patterns to security vulnerabilities in software-intensive system designs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ömer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter |
DISCOA: architectural adaptations for security and QoS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Maarten Rits, Benjamin De Boe, Andreas Schaad |
XacT: a bridge between resource management and access control in multi-layered applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen |
Requirements traceability to support evolution of access control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen |
Towards a unifying view on security contracts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Karsten Sohr, Gail-Joon Ahn, Lars Migge |
Articulating and enforcing authorisation policies with UML and OCL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel |
Enabling control over adaptive program transformation for dynamically evolving mobile software validation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn |
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | John Viega |
Building security requirements with CLASP. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Ben Breech, Lori L. Pollock |
A framework for testing security mechanisms for program-based attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Wes Masri, Andy Podgurski |
Using dynamic information flow analysis to detect attacks against applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Somo Banerjee, Chris A. Mattmann, Nenad Medvidovic, Leana Golubchik |
Leveraging architectural models to inject trust into software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Nancy R. Mead, Ted Stehney |
Security quality requirements engineering (SQUARE) methodology. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | |
Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005 ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![ACM, 1-59593-114-7 The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP BibTeX RDF |
|
1 | Jie Ren 0001, Richard N. Taylor, Paul Dourish, David F. Redmiles |
Towards an architectural treatment of software security: a connector-centric approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
1 | Zaid Dwaikat, Francesco Parisi-Presicce |
Risky trust: risk-based analysis of software systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SESS@ICSE ![In: Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005, pp. 1-7, 2005, ACM, 1-59593-114-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|