


default search action
International Journal of Secure Software Engineering, Volume 5
Volume 5, Number 1, 2014
- Khalifa Toumi, Ana R. Cavalli
, César Andrés:
Validation of a Trust Approach in Multi-Organization Environments. 1-18 - Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications. 19-38 - Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis:
Remote E-Voting Using the Smart Card Web Server. 39-60 - Christine Fricker, Philippe Robert, Yousra Chabchoub:
Improving the Detection of On-Line Vertical Port Scan in IP Traffic. 61-74
Volume 5, Number 2, 2014
- Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, Paolo Giorgini:
Threat Analysis in Goal-Oriented Security Requirements Modelling. 1-19 - Kristian Beckers, Isabelle Côté, Ludger Goeke, Selim Güler, Maritta Heisel:
A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain. 20-43 - Vincenzo Ciancia
, José Antonio Martín, Fabio Martinelli, Ilaria Matteucci
, Marinella Petrocchi, Ernesto Pimentel:
Automated Synthesis and Ranking of Secure BPMN Orchestrators. 44-64
Volume 5, Number 3, 2014
- Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi:
Information Theoretic XSS Attack Detection in Web Applications. 1-15 - Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen:
Design Churn as Predictor of Vulnerabilities? 16-31 - Mingqiu Song, Donghao Chen, Elizabeth Sylvester Mkoba:
Secure Software Development Assimilation: Effects of External Pressures and Roles of Internal Factors. 32-55 - Mehrez Essafi, Henda Ben Ghézala:
Meta-Modeling Based Secure Software Development Processes. 56-74
Volume 5, Number 4, 2014
- Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takao Okubo, Yoshiaki Fukazawa:
Validating Security Design Pattern Applications by Testing Design Models. 1-30 - Annette Tetmeyer, Daniel D. Hein, Hossein Saiedian:
A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes. 31-47 - Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout
, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. 48-98

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
