Abstract is missing.
- Model-Based Refinement of Security Policies in Collaborative Virtual OrganisationsBenjamin Aziz, Alvaro E. Arenas, Michael D. Wilson. 1-14 [doi]
- Automatic Conformance Checking of Role-Based Access Control Policies via AlloyDavid J. Power, Mark Slaymaker, Andrew Simpson. 15-28 [doi]
- Security Validation of Business Processes via Model-CheckingWihem Arsac, Luca Compagna, Giancarlo Pellegrino, Serena Elisa Ponta. 29-42 [doi]
- On-Device Control Flow Verification for Java ProgramsArnaud Fontaine, Samuel Hym, Isabelle Simplot-Ryl. 43-57 [doi]
- Efficient Symbolic Execution for Analysing Cryptographic Protocol ImplementationsRicardo Corin, Felipe Andrés Manzano. 58-72 [doi]
- Predictability of EnforcementNataliia Bielova, Fabio Massacci. 73-86 [doi]
- SessionShield: Lightweight Protection against Session HijackingNick Nikiforakis, Wannes Meert, Yves Younan, Martin Johns, Wouter Joosen. 87-100 [doi]
- Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web ApplicationsThanh-Binh Dao, Etsuya Shibayama. 101-113 [doi]
- Middleware Support for Complex and Distributed Security Services in Multi-tier Web ApplicationsPhilippe De Ryck, Lieven Desmet, Wouter Joosen. 114-127 [doi]
- Lightweight Modeling and Analysis of Security ConceptsJörn Eichler. 128-141 [doi]
- A Tool-Supported Method for the Design and Implementation of Secure Distributed ApplicationsLinda Ariani Gunawan, Frank Alexander Kraemer, Peter Herrmann. 142-155 [doi]
- An Architecture-Centric Approach to Detecting Security Patterns in SoftwareMichaela Bunke, Karsten Sohr. 156-166 [doi]
- The Security Twin PeaksThomas Heyman, Koen Yskout, Riccardo Scandariato, Holger Schmidt, Yijun Yu. 167-180 [doi]
- Evolution of Security Requirements Tests for Service-Centric SystemsMichael Felderer, Berthold Agreiter, Ruth Breu. 181-194 [doi]
- After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and FixesFabio Massacci, Stephan Neuhaus, Viet Hung Nguyen. 195-208 [doi]
- Authorization Enforcement Usability Case StudySteffen Bartsch. 209-220 [doi]
- Scalable Authorization Middleware for Service Oriented ArchitecturesTom Goovaerts, Lieven Desmet, Wouter Joosen. 221-233 [doi]
- Adaptable Authentication Model: Exploring Security with Weaker Attacker ModelsNaveed Ahmed, Christian D. Jensen. 234-247 [doi]
- Idea: Interactive Support for Secure Software DevelopmentJing Xie, Bill Chu, Heather Richter Lipford. 248-255 [doi]
- Idea: A Reference Platform for Systematic Information Security Management Tool SupportIngo Müller, Jun Han, Jean-Guy Schneider, Steven Versteeg. 256-263 [doi]
- Idea: Simulation Based Security Requirement Verification for Transaction Level ModelsJohannes Loinig, Christian Steger, Reinhold Weiss, Ernst Haselsteiner. 264-271 [doi]