Journal: IJSSE

Volume 3, Issue 4

1 -- 26Ousmane Amadou Dia, Csilla Farkas. A Practical Framework for Policy Composition and Conflict Resolution
27 -- 44Bernard Spitz, Riccardo Scandariato, Wouter Joosen. Extraction of an Architectural Model for Least Privilege Analysis
45 -- 64Safaa Hachana, Nora Cuppens-Boulahia, Frédéric Cuppens. Role Mining to Assist Authorization Governance: How Far Have We Gone?
65 -- 83K. Shantha Kumari, T. Chithraleka. A Comparative Analysis of Access Control Policy Modeling Approaches

Volume 3, Issue 3

1 -- 22Shareeful Islam, Haralambos Mouratidis, Christos Kalloniatis, Aleksandar Hudic, Lorenz Zechner. Model Based Process to Support Security and Privacy Requirements Engineering
23 -- 49Ayda Saïdane, Nicolas Guelfi. SETER: Towards Architecture-Model Based Security Engineering
50 -- 65Yujian Fu, Jeffery Kulick, Lok K. Yan, Steven Drager. Formal Modeling and Verification of Security Property in Handel C Program

Volume 3, Issue 2

1 -- 35Alessandra Bagnato, Barbara Kordy, Per Håkon Meland, Patrick Schweitzer. Attribute Decoration of Attack-Defense Trees
36 -- 53Michalis Pavlidis, Haralambos Mouratidis, Shareeful Islam. Modelling Security Using Trust Based Concepts
54 -- 73Péter Kárpáti, Guttorm Sindre, Raimundas Matulevicius. Comparing Misuse Case and Mal-Activity Diagrams for Modelling Social Engineering Attacks

Volume 3, Issue 1

1 -- 19Sandra Trösterer, Elke Beck, Fabiano Dalpiaz, Elda Paja, Paolo Giorgini, Manfred Tscheligi. Formative User-Centered Evaluation of Security Modeling: Results from a Case Study
20 -- 36Andreas L. Opdahl, Christian Raspotnig. Improving Security and Safety Modelling with Failure Sequence Diagrams
37 -- 61Takao Okubo, Haruhiko Kaiya, Nobukazu Yoshioka. Analyzing Impacts on Software Enhancement Caused by Security Design Alternatives with Patterns
62 -- 63Khaled M. Khan. Software Security Engineering: Design and Applications