| |
Ahmed, Naved
|
SESS '11: "Towards Transformation Guidelines ..."
Towards Transformation Guidelines from Secure Tropos to Misuse Cases (Position Paper)
Naved Ahmed and Raimundas Matulevičius
(University of Tartu, Estonia)
@InProceedings{SESS11p8,
author = {Naved Ahmed and Raimundas Matulevičius},
title = {Towards Transformation Guidelines from Secure Tropos to Misuse Cases (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {8-7},
doi = {},
year = {2011},
}
|
| |
Ahn, MahnKi |
SESS '11: "Power Analysis Attack and ..."
Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)
KiSeok Bae, MahnKi Ahn, HoonJae Lee, JaeCheol Ha, and SangJae Moon
(Kyungpook National University, Korea; Defence agency for Technology and Quality, Korea; Dongseo University, Korea; Hoseo University, Korea)
@InProceedings{SESS11p22,
author = {KiSeok Bae and MahnKi Ahn and HoonJae Lee and JaeCheol Ha and SangJae Moon},
title = {Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Akoka, Jacky |
SESS '11: "A Conceptual Meta-Model for ..."
A Conceptual Meta-Model for Secured Information Systems
Nadira Lammari, Jean-Sylvain Bucumi, Jacky Akoka, and Isabelle Comyn-Wattiau
(CNAM, France)
@InProceedings{SESS11p22,
author = {Nadira Lammari and Jean-Sylvain Bucumi and Jacky Akoka and Isabelle Comyn-Wattiau},
title = {A Conceptual Meta-Model for Secured Information Systems},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Bae, KiSeok
|
SESS '11: "Power Analysis Attack and ..."
Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)
KiSeok Bae, MahnKi Ahn, HoonJae Lee, JaeCheol Ha, and SangJae Moon
(Kyungpook National University, Korea; Defence agency for Technology and Quality, Korea; Dongseo University, Korea; Hoseo University, Korea)
@InProceedings{SESS11p22,
author = {KiSeok Bae and MahnKi Ahn and HoonJae Lee and JaeCheol Ha and SangJae Moon},
title = {Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Bucumi, Jean-Sylvain |
SESS '11: "A Conceptual Meta-Model for ..."
A Conceptual Meta-Model for Secured Information Systems
Nadira Lammari, Jean-Sylvain Bucumi, Jacky Akoka, and Isabelle Comyn-Wattiau
(CNAM, France)
@InProceedings{SESS11p22,
author = {Nadira Lammari and Jean-Sylvain Bucumi and Jacky Akoka and Isabelle Comyn-Wattiau},
title = {A Conceptual Meta-Model for Secured Information Systems},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Buyens, Koen |
SESS '11: "Composition of Least Privilege ..."
Composition of Least Privilege Analysis Results in Software Architectures (Position Paper)
Koen Buyens, Riccardo Scandariato, and Wouter Joosen
(Katholieke Universiteit Leuven, Belgium)
@InProceedings{SESS11p1,
author = {Koen Buyens and Riccardo Scandariato and Wouter Joosen},
title = {Composition of Least Privilege Analysis Results in Software Architectures (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {1-0},
doi = {},
year = {2011},
}
|
| |
Co, Michele
|
SESS '11: "PEASOUP: Preventing Exploits ..."
PEASOUP: Preventing Exploits Against Software of Uncertain Provenance (Position Paper)
Michele Co and Brian Mastropietro
(University of Virginia, USA; Grammatech Inc., USA; Georgia Institute of Technology, USA; Raytheon Inc., USA)
@InProceedings{SESS11p15,
author = {Michele Co and Brian Mastropietro},
title = {PEASOUP: Preventing Exploits Against Software of Uncertain Provenance (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {15-14},
doi = {},
year = {2011},
}
|
| |
Comyn-Wattiau, Isabelle |
SESS '11: "A Conceptual Meta-Model for ..."
A Conceptual Meta-Model for Secured Information Systems
Nadira Lammari, Jean-Sylvain Bucumi, Jacky Akoka, and Isabelle Comyn-Wattiau
(CNAM, France)
@InProceedings{SESS11p22,
author = {Nadira Lammari and Jean-Sylvain Bucumi and Jacky Akoka and Isabelle Comyn-Wattiau},
title = {A Conceptual Meta-Model for Secured Information Systems},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Gamble, M. Todd
|
SESS '11: "Security Policy Foundations ..."
Security Policy Foundations in Context UNITY
M. Todd Gamble, Rose F. Gamble, and Matthew L. Hale
(University of Tulsa, USA)
@InProceedings{SESS11p8,
author = {M. Todd Gamble and Rose F. Gamble and Matthew L. Hale},
title = {Security Policy Foundations in Context UNITY},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {8-7},
doi = {},
year = {2011},
}
|
| |
Gamble, Rose F. |
SESS '11: "Security Policy Foundations ..."
Security Policy Foundations in Context UNITY
M. Todd Gamble, Rose F. Gamble, and Matthew L. Hale
(University of Tulsa, USA)
@InProceedings{SESS11p8,
author = {M. Todd Gamble and Rose F. Gamble and Matthew L. Hale},
title = {Security Policy Foundations in Context UNITY},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {8-7},
doi = {},
year = {2011},
}
|
| |
Ha, JaeCheol
|
SESS '11: "Power Analysis Attack and ..."
Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)
KiSeok Bae, MahnKi Ahn, HoonJae Lee, JaeCheol Ha, and SangJae Moon
(Kyungpook National University, Korea; Defence agency for Technology and Quality, Korea; Dongseo University, Korea; Hoseo University, Korea)
@InProceedings{SESS11p22,
author = {KiSeok Bae and MahnKi Ahn and HoonJae Lee and JaeCheol Ha and SangJae Moon},
title = {Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Hale, Matthew L. |
SESS '11: "Security Policy Foundations ..."
Security Policy Foundations in Context UNITY
M. Todd Gamble, Rose F. Gamble, and Matthew L. Hale
(University of Tulsa, USA)
@InProceedings{SESS11p8,
author = {M. Todd Gamble and Rose F. Gamble and Matthew L. Hale},
title = {Security Policy Foundations in Context UNITY},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {8-7},
doi = {},
year = {2011},
}
|
| |
Joosen, Wouter
|
SESS '11: "Composition of Least Privilege ..."
Composition of Least Privilege Analysis Results in Software Architectures (Position Paper)
Koen Buyens, Riccardo Scandariato, and Wouter Joosen
(Katholieke Universiteit Leuven, Belgium)
@InProceedings{SESS11p1,
author = {Koen Buyens and Riccardo Scandariato and Wouter Joosen},
title = {Composition of Least Privilege Analysis Results in Software Architectures (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {1-0},
doi = {},
year = {2011},
}
|
| |
Lammari, Nadira
|
SESS '11: "A Conceptual Meta-Model for ..."
A Conceptual Meta-Model for Secured Information Systems
Nadira Lammari, Jean-Sylvain Bucumi, Jacky Akoka, and Isabelle Comyn-Wattiau
(CNAM, France)
@InProceedings{SESS11p22,
author = {Nadira Lammari and Jean-Sylvain Bucumi and Jacky Akoka and Isabelle Comyn-Wattiau},
title = {A Conceptual Meta-Model for Secured Information Systems},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Lee, HoonJae |
SESS '11: "Power Analysis Attack and ..."
Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)
KiSeok Bae, MahnKi Ahn, HoonJae Lee, JaeCheol Ha, and SangJae Moon
(Kyungpook National University, Korea; Defence agency for Technology and Quality, Korea; Dongseo University, Korea; Hoseo University, Korea)
@InProceedings{SESS11p22,
author = {KiSeok Bae and MahnKi Ahn and HoonJae Lee and JaeCheol Ha and SangJae Moon},
title = {Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Martinelli, Fabio
|
SESS '11: "Preserving Security Properties ..."
Preserving Security Properties under Refinement
Fabio Martinelli and Ilaria Matteucci
(IIT-CNR, Italy)
@InProceedings{SESS11p15,
author = {Fabio Martinelli and Ilaria Matteucci},
title = {Preserving Security Properties under Refinement},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {15-14},
doi = {},
year = {2011},
}
|
| |
Mastropietro, Brian |
SESS '11: "PEASOUP: Preventing Exploits ..."
PEASOUP: Preventing Exploits Against Software of Uncertain Provenance (Position Paper)
Michele Co and Brian Mastropietro
(University of Virginia, USA; Grammatech Inc., USA; Georgia Institute of Technology, USA; Raytheon Inc., USA)
@InProceedings{SESS11p15,
author = {Michele Co and Brian Mastropietro},
title = {PEASOUP: Preventing Exploits Against Software of Uncertain Provenance (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {15-14},
doi = {},
year = {2011},
}
|
| |
Matteucci, Ilaria |
SESS '11: "Preserving Security Properties ..."
Preserving Security Properties under Refinement
Fabio Martinelli and Ilaria Matteucci
(IIT-CNR, Italy)
@InProceedings{SESS11p15,
author = {Fabio Martinelli and Ilaria Matteucci},
title = {Preserving Security Properties under Refinement},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {15-14},
doi = {},
year = {2011},
}
|
| |
Matulevičius, Raimundas |
SESS '11: "Towards Transformation Guidelines ..."
Towards Transformation Guidelines from Secure Tropos to Misuse Cases (Position Paper)
Naved Ahmed and Raimundas Matulevičius
(University of Tartu, Estonia)
@InProceedings{SESS11p8,
author = {Naved Ahmed and Raimundas Matulevičius},
title = {Towards Transformation Guidelines from Secure Tropos to Misuse Cases (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {8-7},
doi = {},
year = {2011},
}
|
| |
Moon, SangJae |
SESS '11: "Power Analysis Attack and ..."
Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)
KiSeok Bae, MahnKi Ahn, HoonJae Lee, JaeCheol Ha, and SangJae Moon
(Kyungpook National University, Korea; Defence agency for Technology and Quality, Korea; Dongseo University, Korea; Hoseo University, Korea)
@InProceedings{SESS11p22,
author = {KiSeok Bae and MahnKi Ahn and HoonJae Lee and JaeCheol Ha and SangJae Moon},
title = {Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {22-21},
doi = {},
year = {2011},
}
|
| |
Scandariato, Riccardo
|
SESS '11: "Composition of Least Privilege ..."
Composition of Least Privilege Analysis Results in Software Architectures (Position Paper)
Koen Buyens, Riccardo Scandariato, and Wouter Joosen
(Katholieke Universiteit Leuven, Belgium)
@InProceedings{SESS11p1,
author = {Koen Buyens and Riccardo Scandariato and Wouter Joosen},
title = {Composition of Least Privilege Analysis Results in Software Architectures (Position Paper)},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {1-0},
doi = {},
year = {2011},
}
|
| |
Shin, Yonghee |
SESS '11: "An Initial Study on the Use ..."
An Initial Study on the Use of Execution Complexity Metrics as Indicators of Software Vulnerabilities
Yonghee Shin and Laurie Williams
(DePaul University, USA; North Carolina State University, USA)
@InProceedings{SESS11p1,
author = {Yonghee Shin and Laurie Williams},
title = {An Initial Study on the Use of Execution Complexity Metrics as Indicators of Software Vulnerabilities},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {1-0},
doi = {},
year = {2011},
}
|
| |
Williams, Laurie
|
SESS '11: "An Initial Study on the Use ..."
An Initial Study on the Use of Execution Complexity Metrics as Indicators of Software Vulnerabilities
Yonghee Shin and Laurie Williams
(DePaul University, USA; North Carolina State University, USA)
@InProceedings{SESS11p1,
author = {Yonghee Shin and Laurie Williams},
title = {An Initial Study on the Use of Execution Complexity Metrics as Indicators of Software Vulnerabilities},
booktitle = {Proc.\ SESS},
publisher = {ACM},
pages = {1-0},
doi = {},
year = {2011},
}
|