default search action
6th SESS@ICSE 2010: Cape Town, South Africa
- Seok-Won Lee, Mattia Monga, Jan Jürjens:
ICSE Workshop on Software Engineering for Secure Systems, SESS 2010, May 2, 2010, Cape Town, South Africa. ACM 2010, ISBN 978-1-60558-965-7 - Markus Luckey, Andrea Baumann, Daniel Méndez Fernández, Stefan Wagner:
Reusing security requirements using an extended quality model. 1-7 - Sven Lachmund:
Auto-generating access control policies for applications by static analysis with user input recognition. 8-14 - Sarah Al-Azzani, Rami Bahsoon:
Using implied scenarios in security testing. 15-21 - Yan Wu, Robin A. Gandhi, Harvey P. Siy:
Using semantic templates to study vulnerabilities recorded in large software repositories. 22-28 - Shamal Faily, Ivan Flechais:
A meta-model for usable secure requirements engineering. 29-35 - David Byers, Nahid Shahmehri:
Unified modeling of attacks, vulnerabilities and security activities. 36-42 - Angelo Ciampa, Corrado Aaron Visaggio, Massimiliano Di Penta:
A heuristic-based approach for detecting SQL-injection vulnerabilities in web applications. 43-49 - Tanveer Mustafa, Michael Drouineaud, Karsten Sohr:
Towards formal specification and verification of a role-based authorization engine using JML. 50-57 - Jianning Geng, Lin Liu, Barrett R. Bryant:
Towards a personalized privacy management framework. 58-64 - Andrea Avancini, Mariano Ceccato:
Towards security testing with taint analysis and genetic algorithms. 65-71
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.