Abstract is missing.
- Reusable security use cases for mobile grid environmentsDavid G. Rosado, Eduardo Fernández-Medina, Javier López. 1-8 [doi]
- Resolving least privilege violations in software architecturesKoen Buyens, Bart De Win, Wouter Joosen. 9-16 [doi]
- Intrusion detection using signatures extracted from execution profilesMarwa El-Ghali, Wes Masri. 17-24 [doi]
- A hybrid analysis framework for detecting web application vulnerabilitiesMattia Monga, Roberto Paleari, Emanuele Passerini. 25-32 [doi]
- SWAP: Mitigating XSS attacks using a reverse proxyPeter Würzinger, Christian Platzer, Christian Ludl, Engin Kirda, Christopher Kruegel. 33-39 [doi]
- Metamodel for privacy policies within SOADavid S. Allison, Hany F. El Yamany, Miriam A. M. Capretz. 40-46 [doi]
- MUTEC: Mutation-based testing of Cross Site ScriptingHossain Shahriar, Mohammad Zulkernine. 47-53 [doi]
- RUP-based process model for security requirements engineering in value-added service developmentHrvoje Belani, Zeljka Car, Antun Caric. 54-60 [doi]
- Improving perimeter security with security-oriented program transformationsMunawar Hafiz, Ralph E. Johnson. 61-67 [doi]
- Generating formal specifications for security-critical applications - A model-driven approachNina Moebius, Kurt Stenzel, Wolfgang Reif. 68-74 [doi]