![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
ISSSE 2006, Arlington, VA, USA
- Samuel T. Redwine Jr.:
2006 IEEE International Symposium on Secure Software Engineering, ISSSE 2006, Arlington, VA, USA, March 16 -17, 2006. 2006
Formal Methods including SPARK
- Bryan Rossebo, Paul W. Oman, Jim Alves-Foss, Ryan Blue, Paul Jaszkowiak:
Using SPARK-Ada to Model and Verify a MILS Message Router. - Janet Barnes, Rod Chapman, Randy Johnson, James C. Widmaier, Bill Everett, David Cooper:
Engineering the Tokeneer Enclave Protection Software.
Panel Discussion
- John Anton, Martin Croxford, Alessandro Coglio, Janet Barnes, Randy Johnson, Tim Kremann:
Two Demonstrations of Economical EAL5+ Development for Tokeneer.
Threats and Countermeasures
- Calton Pu, Jinpeng Wei:
A Methodical Defense against TOCTTOU Attacks: The EDGI Approach. - Danilo Bruschi, Lorenzo Martignoni, Mattia Monga:
Using Code Normalization for Fighting Self-Mutating Malware. - William G. J. Halfond, Jeremy Viegas, Alessandro Orso:
A Classification of SQL Injection Attacks and Countermeasures.
Common Criteria
- Suvda Myagmar, William Yurcik:
Why Johnny Can Hack: The Mismatch between Vulnerabilities and Security Protection Standards. - Amit M. Paradkar, Suzanne McIntosh, Sam Weber, David C. Toll, Paul A. Karger, Matt Kaplan:
Chicken & Egg: Dependencies in Security Testing and Compliance with Common Criteria Evaluations. - Thuy D. Nguyen, Cynthia E. Irvine, Douglas R. Kane Jr.:
Using Common Criteria Methodology to Express Informal Security Requirements.
Java and Safety Bounds
- Christian Hammer, Jens Krinke, Gregor Snelting:
Information Flow Control for Java Based on Path Conditions in Dependence Graphs. - Gang Tan, Andrew W. Appel, Srimat Chakradhar, Anand Raghunathan, Srivaths Ravi, Daniel C. Wang:
Safe Java Native Interface. - Jianliang Yi, Weijiang Yu, Aloysius K. Mok:
Resource Bound Safety in Grid Computing.
Policy and UML
- Rebekah Leslie:
Dynamic Intransitive Noninterference. - Thuong Doan, Laurent Michel, Steven A. Demurjian:
A Formal Framework for Secure Design and Constraint Checking in UML. - Benjamin Fontan, Sara Mota, Thierry Villemur, Pierre de Saqui-Sannes, Jean-Pierre Courtiat:
UML-Based Modeling and Formal Verification of Authentication Protocols.
Practices
- Yngve Espelid, Lars-Helge Netland, Khalid A. Mughal, Kjell Jørgen Hole:
Simplifying Client-Server Application Development with Secure Reusable Components. - Toan Huynh, James Miller:
Developing Secure Web-Based Applications. - Jane Cleland-Huang, Mark Denne, Ghazy Mahjub, Nilesh Patel:
A Goal-Oriented Approach for Mitigating Security and Continuity Risks.
Panel Discussion
- Nadya Bartol, Booz Allen Hamilton, Joe Jarzombek, Cheryl L. Jones, Jim McCurley, John Murdoch:
Measurement to Support Secure Software Engineering.
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.