researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IJSSE
Home
Index
Info
Volume
Volume
3
, Issue
4
1
--
26
Ousmane Amadou Dia
,
Csilla Farkas
.
A Practical Framework for Policy Composition and Conflict Resolution
27
--
44
Bernard Spitz
,
Riccardo Scandariato
,
Wouter Joosen
.
Extraction of an Architectural Model for Least Privilege Analysis
45
--
64
Safaa Hachana
,
Nora Cuppens-Boulahia
,
Frédéric Cuppens
.
Role Mining to Assist Authorization Governance: How Far Have We Gone?
65
--
83
K. Shantha Kumari
,
T. Chithraleka
.
A Comparative Analysis of Access Control Policy Modeling Approaches
Volume
3
, Issue
3
1
--
22
Shareeful Islam
,
Haralambos Mouratidis
,
Christos Kalloniatis
,
Aleksandar Hudic
,
Lorenz Zechner
.
Model Based Process to Support Security and Privacy Requirements Engineering
23
--
49
Ayda Saïdane
,
Nicolas Guelfi
.
SETER: Towards Architecture-Model Based Security Engineering
50
--
65
Yujian Fu
,
Jeffery Kulick
,
Lok K. Yan
,
Steven Drager
.
Formal Modeling and Verification of Security Property in Handel C Program
Volume
3
, Issue
2
1
--
35
Alessandra Bagnato
,
Barbara Kordy
,
Per Håkon Meland
,
Patrick Schweitzer
.
Attribute Decoration of Attack-Defense Trees
36
--
53
Michalis Pavlidis
,
Haralambos Mouratidis
,
Shareeful Islam
.
Modelling Security Using Trust Based Concepts
54
--
73
Péter Kárpáti
,
Guttorm Sindre
,
Raimundas Matulevicius
.
Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks
Volume
3
, Issue
1
1
--
19
Sandra Trösterer
,
Elke Beck
,
Fabiano Dalpiaz
,
Elda Paja
,
Paolo Giorgini
,
Manfred Tscheligi
.
Formative User-Centered Evaluation of Security Modeling: Results from a Case Study
20
--
36
Andreas L. Opdahl
,
Christian Raspotnig
.
Improving Security and Safety Modelling with Failure Sequence Diagrams
37
--
61
Takao Okubo
,
Haruhiko Kaiya
,
Nobukazu Yoshioka
.
Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns
62
--
63
Khaled M. Khan
.
Software Security Engineering: Design and Applications