:facetid:toc:\"db/conf/safeconfig/safeconfig2012.bht\"OK:facetid:toc:db/conf/safeconfig/safeconfig2012.bhtEhab Al-ShaerXinming OuGeoffrey G. XieAutomated Security Management [papers from SafeConfig 2012, Baltimore Inner Harbor, MD, USA]SafeConfigSpringer2013Editorshipconf/safeconfig/201210.1007/978-3-319-01433-3https://doi.org/10.1007/978-3-319-01433-3https://dblp.org/rec/conf/safeconfig/2012URL#4250164Mohammed Noraden AlsalehEhab Al-ShaerAdel El-AtawyTowards a Unified Modeling and Verification of Network and System Security Configurations.SafeConfig3-192012Conference and Workshop Papersclosedconf/safeconfig/AlsalehAE1210.1007/978-3-319-01433-3_1https://doi.org/10.1007/978-3-319-01433-3_1https://dblp.org/rec/conf/safeconfig/AlsalehAE12URL#4487755Nazia BadarJaideep VaidyaVijayalakshmi AtluriBasit ShafiqRisk Based Access Control Using Classification.SafeConfig79-952012Conference and Workshop Papersclosedconf/safeconfig/BadarVAS1210.1007/978-3-319-01433-3_5https://doi.org/10.1007/978-3-319-01433-3_5https://dblp.org/rec/conf/safeconfig/BadarVAS12URL#4487756Martín BarrèreGaetan HurelRemi BadonnelOlivier FestorIncreasing Android Security Using a Lightweight OVAL-Based Vulnerability Assessment Framework.SafeConfig41-582012Conference and Workshop Papersclosedconf/safeconfig/BarrereHBF1210.1007/978-3-319-01433-3_3https://doi.org/10.1007/978-3-319-01433-3_3https://dblp.org/rec/conf/safeconfig/BarrereHBF12URL#4487757Michael R. ClementDennis M. VolpanoProgrammable Diagnostic Network Measurement with Localization and Traffic Observation.SafeConfig153-1672012Conference and Workshop Papersclosedconf/safeconfig/ClementV1210.1007/978-3-319-01433-3_9https://doi.org/10.1007/978-3-319-01433-3_9https://dblp.org/rec/conf/safeconfig/ClementV12URL#4487758Ichita HigurashiAkira KanaokaMasahiko KatoEiji OkamotoDiscovery of Unexpected Services and Communication Paths in Networked Systems.SafeConfig169-1782012Conference and Workshop Papersclosedconf/safeconfig/HigurashiKKO1210.1007/978-3-319-01433-3_10https://doi.org/10.1007/978-3-319-01433-3_10https://dblp.org/rec/conf/safeconfig/HigurashiKKO12URL#4487759Masahiko KatoTakumi MatsunamiAkira KanaokaHiroshi KoideEiji OkamotoTracing Advanced Persistent Threats in Networked Systems.SafeConfig179-1872012Conference and Workshop Papersclosedconf/safeconfig/KatoMKKO1210.1007/978-3-319-01433-3_11https://doi.org/10.1007/978-3-319-01433-3_11https://dblp.org/rec/conf/safeconfig/KatoMKKO12URL#4487760Meixing LeKrishna Kant 0001Sushil JajodiaRule Configuration Checking in Secure Cooperative Data Access.SafeConfig135-1492012Conference and Workshop Papersclosedconf/safeconfig/LeKJ1210.1007/978-3-319-01433-3_8https://doi.org/10.1007/978-3-319-01433-3_8https://dblp.org/rec/conf/safeconfig/LeKJ12URL#4487761Shankaranarayanan Puzhavakath NarayananSeungjoon LeeSubhabrata SenGCNav: Generic Configuration Navigation System.SafeConfig99-1172012Conference and Workshop Papersclosedconf/safeconfig/NarayananLS1210.1007/978-3-319-01433-3_6https://doi.org/10.1007/978-3-319-01433-3_6https://dblp.org/rec/conf/safeconfig/NarayananLS12URL#4487762Mohammad Ashiqur RahmanEhab Al-ShaerA Declarative Logic-Based Approach for Threat Analysis of Advanced Metering Infrastructure.SafeConfig59-772012Conference and Workshop Papersclosedconf/safeconfig/RahmanA1210.1007/978-3-319-01433-3_4https://doi.org/10.1007/978-3-319-01433-3_4https://dblp.org/rec/conf/safeconfig/RahmanA12URL#4487763Hayawardh VijayakumarTrent JaegerThe Right Files at the Right Time.SafeConfig119-1332012Conference and Workshop Papersclosedconf/safeconfig/VijayakumarJ1210.1007/978-3-319-01433-3_7https://doi.org/10.1007/978-3-319-01433-3_7https://dblp.org/rec/conf/safeconfig/VijayakumarJ12URL#4487764Mingyi ZhaoPeng Liu 0005Modeling and Checking the Security of DIFC System Configurations.SafeConfig21-382012Conference and Workshop Papersclosedconf/safeconfig/ZhaoL1210.1007/978-3-319-01433-3_2https://doi.org/10.1007/978-3-319-01433-3_2https://dblp.org/rec/conf/safeconfig/ZhaoL12URL#4487765