default search action
7. ESSoS 2015: Milan, Italy
- Frank Piessens, Juan Caballero, Nataliia Bielova:
Engineering Secure Software and Systems - 7th International Symposium, ESSoS 2015, Milan, Italy, March 4-6, 2015. Proceedings. Lecture Notes in Computer Science 8978, Springer 2015, ISBN 978-3-319-15617-0
Formal Methods
- Stefano Calzavara, Alvise Rabitti, Michele Bugliesi:
Formal Verification of Liferay RBAC. 1-16 - Marouane Fazouane, Henning Kopp, Rens W. van der Heijden, Daniel Le Métayer, Frank Kargl:
Formal Verification of Privacy Properties in Electric Vehicle Charging. 17-33 - Martín Ochoa, Jorge Cuéllar, Alexander Pretschner, Per A. Hallgren:
Idea: Unwinding Based Model-Checking and Testing for Non-Interference on EFSMs. 34-42 - Raoul Strackx, Niels Lambrigts:
Idea: State-Continuous Transfer of State in Protected-Module Architectures. 43-50
Machine Learning
- Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon:
Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection. 51-67 - David Pfaff, Sebastian Hack, Christian Hammer:
Learning How to Prevent Return-Oriented Programming Efficiently. 68-85
Cloud and Passwords
- Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, Cynthia E. Irvine:
Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores. 86-101 - Philippe Massonet, Jesus Luna, Alain Pannetrat, Rubén Trapero:
Idea: Optimising Multi-Cloud Deployments with Security Controls as Constraints. 102-110 - Raoul Strackx, Pieter Philippaerts, Frédéric Vogels:
Idea: Towards an Inverted Cloud. 111-118 - Markus Dürmuth, Fabian Angelstorf, Claude Castelluccia, Daniele Perito, Chaabane Abdelberi:
OMEN: Faster Password Guessing Using an Ordered Markov Enumerator. 119-132
Measurements and Ontologies
- Luca Allodi:
The Heavy Tails of Vulnerability Exploitation. 133-148 - Sebastian Banescu, Martín Ochoa, Nils Kunze, Alexander Pretschner:
Idea: Benchmarking Indistinguishability Obfuscation - A Candidate Implementation. 149-156 - Amina Souag, Camille Salinesi, Raúl Mazo, Isabelle Comyn-Wattiau:
A Security Ontology for Security Requirements Elicitation. 157-177
Access Control
- Divya Muthukumaran, Nirupama Talele, Trent Jaeger, Gang Tan:
Producing Hook Placements to Enforce Expected Access Control Policies. 178-195 - Maarten Decat, Jasper Moeys, Bert Lagaisse, Wouter Joosen:
Improving Reuse of Attribute-Based Access Control Policies Using Policy Templates. 196-210 - Lars Hamann, Karsten Sohr, Martin Gogolla:
Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study. 211-226
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.