Sciweavers

11 search results - page 1 / 3
» essos 2010
Sort
View
ESSOS
2010
Springer
14 years 1 months ago
Idea: Efficient Evaluation of Access Control Constraints
Achim D. Brucker, Helmut Petritsch
ESSOS
2010
Springer
14 years 1 months ago
Secure Code Generation for Web Applications
Martin Johns, Christian Beyerlein, Rosemaria Giese...
ESSOS
2010
Springer
14 years 1 months ago
Model-Driven Security Policy Deployment: Property Oriented Approach
Stere Preda, Nora Cuppens-Boulahia, Fréd&ea...
ESSOS
2010
Springer
14 years 1 months ago
Idea: Towards Architecture-Centric Security Analysis of Software
Static security analysis of software has made great progress over the last years. In particular, this applies to the detection of lowlevel security bugs such as buffer overflows,...
Karsten Sohr, Bernhard Berger
ESSOS
2010
Springer
14 years 1 months ago
Formally-Based Black-Box Monitoring of Security Protocols
In the challenge of ensuring the correct behaviour of legacy implementations of security protocols, a formally-based approach is presented to design and implement monitors that sto...
Alfredo Pironti, Jan Jürjens