


default search action
1st SESS@ICSE 2005: St. Louis, Missouri, USA
- Proceedings of the 2005 Workshop on Software Engineering for Secure Systems - Building Trustworthy Applications, SESS 2005, St. Louis, Missouri, USA, May 15-16, 2005. ACM 2005, ISBN 1-59593-114-7

- Jie Ren, Richard N. Taylor, Paul Dourish, David F. Redmiles:

Towards an architectural treatment of software security: a connector-centric approach. 1-7 - Nancy R. Mead, Ted Stehney:

Security quality requirements engineering (SQUARE) methodology. 1-7 - Wes Masri, Andy Podgurski:

Using dynamic information flow analysis to detect attacks against applications. 1-7 - Ömer Erdem Demir, Premkumar T. Devanbu, Nenad Medvidovic, Eric Wohlstadter:

DISCOA: architectural adaptations for security and QoS. 1-7 - John Viega:

Building security requirements with CLASP. 1-7 - Somo Banerjee, Chris A. Mattmann, Nenad Medvidovic, Leana Golubchik:

Leveraging architectural models to inject trust into software systems. 1-7 - Maarten Rits, Benjamin De Boe, Andreas Schaad:

XacT: a bridge between resource management and access control in multi-layered applications. 1-7 - Bart De Win, Frank Piessens, Jan Smans, Wouter Joosen:

Towards a unifying view on security contracts. 1-7 - Zaid Dwaikat, Francesco Parisi-Presicce:

Risky trust: risk-based analysis of software systems. 1-7 - Mike Jochen, Anteneh Addis Anteneh, Lori L. Pollock, Lisa M. Marvel:

Enabling control over adaptive program transformation for dynamically evolving mobile software validation. 1-7 - Karsten Sohr

, Gail-Joon Ahn
, Lars Migge:
Articulating and enforcing authorisation policies with UML and OCL. 1-7 - Seok Won Lee, Robin A. Gandhi, Gail-Joon Ahn

:
Establishing trustworthiness in services of the critical infrastructure through certification and accreditation. 1-7 - Ben Breech, Lori L. Pollock:

A framework for testing security mechanisms for program-based attacks. 1-7 - Sam Weber, Paul A. Karger, Amit M. Paradkar:

A software flaw taxonomy: aiming tools at security. 1-7 - Michael Gegick

, Laurie A. Williams:
Matching attack patterns to security vulnerabilities in software-intensive system designs. 1-7 - Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen:

Requirements traceability to support evolution of access control. 1-7

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














