


default search action
4. ESSoS 2012: Eindhoven, The Netherlands
- Gilles Barthe

, Benjamin Livshits, Riccardo Scandariato:
Engineering Secure Software and Systems - 4th International Symposium, ESSoS 2012, Eindhoven, The Netherlands, February, 16-17, 2012. Proceedings. Lecture Notes in Computer Science 7159, Springer 2012, ISBN 978-3-642-28165-5 - Guillaume Barbu, Philippe Hoogvorst, Guillaume Duc:

Application-Replay Attack on Java Cards: When the Garbage Collector Gets Confused. 1-13 - Kristian Beckers, Stephan Faßbender, Maritta Heisel, Jan-Christoph Küster, Holger Schmidt:

Supporting the Development and Documentation of ISO 27001 Information Security Management Systems through Security Requirements Engineering Approaches. 14-21 - Peter T. Breuer

, Jonathan P. Bowen
:
Typed Assembler for a RISC Crypto-Processor. 22-29 - Matteo Maria Casalino, Henrik Plate, Slim Trabelsi:

Transversal Policy Conflict Detection. 30-37 - Samson Gejibo, Federico Mancini, Khalid A. Mughal, Remi Valvik, Jørn Klungsøyr:

Challenges in Implementing an End-to-End Secure Protocol for Java ME-Based Mobile Data Collection in Low-Budget Settings. 38-45 - Máté Kovács, Helmut Seidl:

Runtime Enforcement of Information Flow Security in Tree Manipulating Processes. 46-59 - Massimiliano Masi, Rosario Pugliese

, Francesco Tiezzi:
Formalisation and Implementation of the XACML Access Control Mechanism. 60-74 - Francisco Moyano

, M. Carmen Fernández Gago
, Isaac Agudo
, Javier López
:
A Task Ordering Approach for Automatic Trust Establishment. 75-88 - Viet Hung Nguyen, Fabio Massacci

:
An Idea of an Independent Validation of Vulnerability Discovery Models. 89-96 - Martín Ochoa

, Jan Jürjens, Daniel Warzecha:
A Sound Decision Procedure for the Compositionality of Secrecy. 97-105 - Rahul Potharaju, Andrew Newell, Cristina Nita-Rotaru, Xiangyu Zhang:

Plagiarizing Smartphone Applications: Attack Strategies and Defense Techniques. 106-120 - Mehrdad Saadatmand

, Antonio Cicchetti
, Mikael Sjödin:
Design of Adaptive Security Mechanisms for Real-Time Embedded Systems. 121-134 - George Stergiopoulos

, Bill Tsoumas, Dimitris Gritzalis:
Hunting Application-Level Logical Errors. 135-142 - Huafei Zhu, Hong Xiao:

Optimal Trust Mining and Computing on Keyed MapReduce. 143-150

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














