Abstract is missing.
- Reusing security requirements using an extended quality modelMarkus Luckey, Andrea Baumann, Daniel Méndez Fernández, Stefan Wagner. 1-7 [doi]
- Auto-generating access control policies for applications by static analysis with user input recognitionSven Lachmund. 8-14 [doi]
- Using implied scenarios in security testingSarah Al-Azzani, Rami Bahsoon. 15-21 [doi]
- Using semantic templates to study vulnerabilities recorded in large software repositoriesYan Wu, Robin A. Gandhi, Harvey P. Siy. 22-28 [doi]
- A meta-model for usable secure requirements engineeringShamal Faily, Ivan Flechais. 29-35 [doi]
- Unified modeling of attacks, vulnerabilities and security activitiesDavid Byers, Nahid Shahmehri. 36-42 [doi]
- A heuristic-based approach for detecting SQL-injection vulnerabilities in web applicationsAngelo Ciampa, Corrado Aaron Visaggio, Massimiliano Di Penta. 43-49 [doi]
- Towards formal specification and verification of a role-based authorization engine using JMLTanveer Mustafa, Michael Drouineaud, Karsten Sohr. 50-57 [doi]
- Towards a personalized privacy management frameworkJianning Geng, Lin Liu 0001, Barrett R. Bryant. 58-64 [doi]
- Towards security testing with taint analysis and genetic algorithmsAndrea Avancini, Mariano Ceccato. 65-71 [doi]