Sciweavers

11 search results - page 1 / 3
» essos 2010
Sort
View
109
Voted
ESSOS
2010
Springer
16 years 15 days ago
Idea: Efficient Evaluation of Access Control Constraints
Achim D. Brucker, Helmut Petritsch
ESSOS
2010
Springer
16 years 15 days ago
Secure Code Generation for Web Applications
Martin Johns, Christian Beyerlein, Rosemaria Giese...
122
Voted
ESSOS
2010
Springer
16 years 15 days ago
Model-Driven Security Policy Deployment: Property Oriented Approach
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
136
Voted
ESSOS
2010
Springer
16 years 15 days ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger
125
Voted
ESSOS
2010
Springer
16 years 15 days ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens