Abstract is missing.
- Analyzing Explicit Information FlowSriram K. Rajamani. 1-2 [doi]
- WebAppArmor: A Framework for Robust Prevention of Attacks on Web Applications (Invited Paper)V. N. Venkatakrishnan, Prithvi Bisht, Mike Ter Louw, Michelle Zhou, Kalpana Gondi, Karthik Thotta Ganesh. 3-26 [doi]
- Toward Securely Programming the InternetAndrew C. Myers. 27 [doi]
- Attribution of Malicious BehaviorJonathon T. Giffin, Abhinav Srivastava. 28-47 [doi]
- Unifying Facets of Information IntegrityArnar Birgisson, Alejandro Russo, Andrei Sabelfeld. 48-65 [doi]
- Determining the Integrity of Application Binaries on Unsecure Legacy Machines Using Software Based Remote AttestationRaghunathan Srinivasan, Partha Dasgupta, Tushar Gohad, Amiya Bhattacharya. 66-80 [doi]
- Stamp-It: A Method for Enhancing the Universal Verifiability of E2E Voting SystemsMridul Nandi, Stefan Popoveniuc, Poorvi L. Vora. 81-95 [doi]
- Strengthening XSRF Defenses for Legacy Web Applications Using Whitebox Analysis and TransformationMichelle Zhou, Prithvi Bisht, V. N. Venkatakrishnan. 96-110 [doi]
- Coverage Criteria for Automatic Security Testing of Web ApplicationsThanh-Binh Dao, Etsuya Shibayama. 111-124 [doi]
- A Practical Generic Privacy LanguageMoritz Y. Becker, Alexander Malkis, Laurent Bussard. 125-139 [doi]
- Efficient Detection of the Return-Oriented Programming Malicious CodePing Chen, Xiao Xing, Hao Han, Bing Mao, Li Xie. 140-155 [doi]
- ValueGuard: Protection of Native Applications against Data-Only Buffer OverflowsSteven Van Acker, Nick Nikiforakis, Pieter Philippaerts, Yves Younan, Frank Piessens. 156-170 [doi]
- Mining RBAC Roles under Cardinality ConstraintRavi Kumar 0005, Shamik Sural, Arobinda Gupta. 171-185 [doi]
- Specification of History Based Constraints for Access Control in Conceptual LevelFathieh Faghih, Morteza Amini, Rasool Jalili. 186-200 [doi]
- Abstracting Audit Data for Lightweight Intrusion DetectionWei Wang 0012, Xiangliang Zhang, Georgios Pitsilis. 201-215 [doi]
- A Persistent Public Watermarking of Relational DatabasesRaju Halder, Agostino Cortesi. 216-230 [doi]
- Security Rules ::::versus:::: Security PropertiesMathieu Jaume. 231-245 [doi]
- Protecting and Restraining the Third Party in RFID-Enabled 3PL Supply ChainsShaoying Cai, Chunhua Su, Yingjiu Li, Robert H. Deng, Tieyan Li. 246-260 [doi]