Abstract is missing.
- Risk-driven Security Testing versus Test-driven Security Risk AnalysisGencer Erdogan, Ketil Stølen. 5-10 [doi]
- Security of the OSGi PlatformAnton Philippov, Olga Gadyatskaya, Fabio Massacci. 11-16 [doi]
- Security Guarantees and Evolution: From Models to RealityMartín Ochoa. 17-22 [doi]
- Attack-preserving Security Protocol TransformationsBinh Thanh Nguyen, Christoph Sprenger 0001, David A. Basin. 23-28 [doi]
- Parametric Attack Graph Construction and AnalysisLeanid Krautsevich. 29-34 [doi]
- Enhancing Safety and Security of Distributed Systems through Formal PatternsTobias Mühlbauer, Jonas Eckhardt. 35-40 [doi]
- Service-Oriented Trust and Reputation ArchitectureFrancisco Moyano, Carmen Fernández-Gago, Javier López 0001. 41-46 [doi]
- Federated Authorization for SaaS applicationsMaarten Decat, Bert Lagaisse, Wouter Joosen. 43-48 [doi]
- Access Control Policy Administration supporting User-defined Privacy Preferences: A Use-case in the Context of Patient-centric Health-careThomas Trojer, Ruth Breu. 47-52 [doi]
- Modeling Social Networking PrivacyCarolina Dania. 49-54 [doi]
- Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering ApproachesKristian Beckers. 65-70 [doi]
- The Dark Side of Vulnerability Exploitation: A Proposal for a Research AnalysisLuca Allodi. 71-76 [doi]