default search action
International Journal of Secure Software Engineering, Volume 5
Volume 5, Number 1, 2014
- Khalifa Toumi, Ana R. Cavalli, César Andrés:
Validation of a Trust Approach in Multi-Organization Environments. 1-18 - Romaric Ludinard, Eric Totel, Frédéric Tronel, Vincent Nicomette, Mohamed Kaâniche, Eric Alata, Rim Akrout, Yann Bachy:
An Invariant-Based Approach for Detecting Attacks Against Data in Web Applications. 19-38 - Sheila Cobourne, Lazaros Kyrillidis, Keith Mayes, Konstantinos Markantonakis:
Remote E-Voting Using the Smart Card Web Server. 39-60 - Christine Fricker, Philippe Robert, Yousra Chabchoub:
Improving the Detection of On-Line Vertical Port Scan in IP Traffic. 61-74
Volume 5, Number 2, 2014
- Per Håkon Meland, Elda Paja, Erlend Andreas Gjære, Stéphane Paul, Fabiano Dalpiaz, Paolo Giorgini:
Threat Analysis in Goal-Oriented Security Requirements Modelling. 1-19 - Kristian Beckers, Isabelle Côté, Ludger Goeke, Selim Güler, Maritta Heisel:
A Structured Method for Security Requirements Elicitation concerning the Cloud Computing Domain. 20-43 - Vincenzo Ciancia, José Antonio Martín, Fabio Martinelli, Ilaria Matteucci, Marinella Petrocchi, Ernesto Pimentel:
Automated Synthesis and Ranking of Secure BPMN Orchestrators. 44-64
Volume 5, Number 3, 2014
- Hossain Shahriar, Sarah North, Wei-Chuen Chen, Edward Mawangi:
Information Theoretic XSS Attack Detection in Web Applications. 1-15 - Aram Hovsepyan, Riccardo Scandariato, Maximilian Steff, Wouter Joosen:
Design Churn as Predictor of Vulnerabilities? 16-31 - Mingqiu Song, Donghao Chen, Elizabeth Sylvester Mkoba:
Secure Software Development Assimilation: Effects of External Pressures and Roles of Internal Factors. 32-55 - Mehrez Essafi, Henda Ben Ghézala:
Meta-Modeling Based Secure Software Development Processes. 56-74
Volume 5, Number 4, 2014
- Takanori Kobashi, Nobukazu Yoshioka, Haruhiko Kaiya, Hironori Washizaki, Takao Okubo, Yoshiaki Fukazawa:
Validating Security Design Pattern Applications by Testing Design Models. 1-30 - Annette Tetmeyer, Daniel D. Hein, Hossein Saiedian:
A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes. 31-47 - Michael Felderer, Basel Katt, Philipp Kalb, Jan Jürjens, Martín Ochoa, Federica Paci, Le Minh Sang Tran, Thein Than Tun, Koen Yskout, Riccardo Scandariato, Frank Piessens, Dries Vanoverberghe, Elizabeta Fourneret, Matthias Gander, Bjørnar Solhaug, Ruth Breu:
Evolution of Security Engineering Artifacts: A State of the Art Survey. 48-98
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.