Abstract is missing.
- Towards an Enhanced Design Level Security: Integrating Attack Trees with StatechartsOmar el Ariss, Jianfei Wu, Dianxiang Xu. 1-10 [doi]
- Probabilistic Risk Assessment for Security Requirements: A Preliminary StudySeok-Won Lee. 11-20 [doi]
- Component-Based Malicious Software Engineer Intrusion DetectionMichael Eonsuk Shin, Snehadeep Sethia, Nipul Patel. 21-30 [doi]
- Execution Constraint Verification of Exception Handling on UML Sequence DiagramsSelim Ciraci, Hasan Sözer, Mehmet Aksit, Wilke Havinga. 31-40 [doi]
- Runtime Verification of Domain-Specific Models of Physical Characteristics in Control SoftwareArjan de Roo, Hasan Sözer, Mehmet Aksit. 41-50 [doi]
- Validation of SDL-Based Architectural Design Models: New Coverage CriteriaAndy Restrepo, W. Eric Wong. 51-59 [doi]
- Using Partial Ordered Numbers to Control Information FlowsShih-Chien Chou. 60-69 [doi]
- Security Goals Assurance Based on Software Active MonitoringChangzhi Zhao, Wei Dong, Martin Leucker, Zhichang Qi. 70-79 [doi]
- Model-Driven Monitoring of Time-Critical Systems Based on Aspect-Oriented ProgrammingKi-Seong Lee, Chan-Gun Lee. 80-87 [doi]
- A Feature-Based Modeling Approach for Building Hybrid Access Control SystemsSangsig Kim, Dae-Kyoo Kim, Lunjin Lu, Sooyong Park, Suntae Kim. 88-97 [doi]
- A Practical Covert Channel Identification Approach in Source Code Based on Directed Information Flow GraphJingZheng Wu, Liping Ding, Yongji Wang, Wei Han. 98-107 [doi]
- Comprehensive Two-Level Analysis of Static and Dynamic RBAC Constraints with UML and OCLMirco Kuhlmann, Karsten Sohr, Martin Gogolla. 108-117 [doi]
- Deriving Data Dependence from/for UML State Machine DiagramsHyeonjeong Kim, Doo-Hwan Bae, Vidroha Debroy, W. Eric Wong. 118-126 [doi]
- Automatic Synthesis of Static Fault Trees from System ModelsJianwen Xiang, Kazuo Yanoo, Yoshiharu Maeno, Kumiko Tadano. 127-136 [doi]
- Evaluation of Experiences from Applying the PREDIQT Method in an Industrial Case StudyAida Omerovic, Bjørnar Solhaug, Ketil Stølen. 137-146 [doi]
- On Testing Effectiveness of Metamorphic Relations: A Case StudyMahmuda Asrafi, Huai Liu, Fei-Ching Kuo. 147-156 [doi]
- Mutation-Based Evaluation of Weighted Test Case Selection for Firewall TestingTugkan Tuglular, Gurcan Gercek. 157-164 [doi]
- RELEASE: Generating Exploits Using Loop-Aware Concolic ExecutionBing-Han Li, Shiuhpyng Shieh. 165-173 [doi]
- Towards a Reliable Spam-Proof Tagging SystemEnnan Zhai, Liping Ding, Sihan Qing. 174-181 [doi]
- Dynamic Service Replacement to Improve Composite Service ReliabilityJong-Phil Kim, Jang-Eui Hong. 182-188 [doi]
- ReLACK: A Reliable VoIP Steganography ApproachMohammad Hamdaqa, Ladan Tahvildari. 189-197 [doi]
- Safe Software: Does It Cost More to Develop?W. Eric Wong, Andrea Demel, Vidroha Debroy, Michael F. Siok. 198-207 [doi]
- An Organization-Driven Approach for Enterprise Security Development and ManagementLirong Dai, Yan Bai. 208-215 [doi]
- Trust Observations in Validation ExercisesF. Amato, Massimo Felici, P. Lanzi, G. Lotti, L. Save, Alessandra Tedeschi. 216-223 [doi]