default search action
4. ESSoS 2012: Eindhoven, The Netherlands
- Gilles Barthe, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Lecture Notes in Computer Science 7159, Springer 2012, ISBN 978-3-642-28165-5 - Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc:
Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused. 1-13 - Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt:
Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. 14-21 - Peter T. Breuer, Jonathan P. Bowen:
Typed Assembler for a RISC Crypto-Processor. 22-29 - Matteo Maria Casalino, Henrik Plate, Slim Trabelsi:
Transversal Policy Conflict Detection. 30-37 - Samson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr:
Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings. 38-45 - Máté Kovács, Helmut Seidl:
Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. 46-59 - Massimiliano Masi, Rosario Pugliese, Francesco Tiezzi:
Formalisation and Implementation of the XACML Access Control Mechanism. 60-74 - Francisco Moyano, M. Carmen Fernández Gago, Isaac Agudo, Javier López:
A Task Ordering Approach for Automatic Trust Establishment. 75-88 - Viet Hung Nguyen, Fabio Massacci:
An Idea of an Independent Validation of Vulnerability Discovery Models. 89-96 - Martín Ochoa, Jan Jürjens, Daniel Warzecha:
A Sound Decision Procedure for the Compositionality of Secrecy. 97-105 - Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang:
Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. 106-120 - Mehrdad Saadatmand, Antonio Cicchetti, Mikael Sjödin:
Design of Adaptive Security Mechanisms for Real-Time Embedded Systems. 121-134 - George Stergiopoulos, Bill Tsoumas, Dimitris Gritzalis:
Hunting Application-Level Logical Errors. 135-142 - Huafei Zhu, Hong Xiao:
Optimal Trust Mining and Computing on Keyed MapReduce. 143-150
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.