default search action
Engineering Secure Future Internet Services and Systems 2014
- Maritta Heisel, Wouter Joosen, Javier López, Fabio Martinelli:
Engineering Secure Future Internet Services and Systems - Current Research. Lecture Notes in Computer Science 8431, Springer 2014, ISBN 978-3-319-07451-1 - Kristian Beckers, Isabelle Côté, Stefan Fenz, Denis Hatebur, Maritta Heisel:
A Structured Comparison of Security Standards. 1-34 - Riccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout, Fabio Massacci, Wouter Joosen:
Empirical Assessment of Security Requirements and Architecture: Lessons Learned. 35-64 - Elda Paja, Fabiano Dalpiaz, Paolo Giorgini:
STS-Tool: Security Requirements Engineering for Socio-Technical Systems. 65-96 - Miguel Angel García de Dios, Carolina Dania, David A. Basin, Manuel Clavel:
Model-Driven Development of a Secure eHealth Application. 97-118 - Marianne Busch, Nora Koch, Santiago Suppan:
Modeling Security Features of Web Applications. 119-139 - José Antonio Martín, Fabio Martinelli, Ilaria Matteucci, Ernesto Pimentel, Mathieu Turuani:
On the Synthesis of Secure Services Composition. 140-159 - Animesh Pathak, George Rosca, Valérie Issarny, Maarten Decat, Bert Lagaisse:
Privacy and Access Control in Federated Social Networks. 160-179 - Francisco Moyano, M. Carmen Fernández Gago, Benoit Baudry, Javier López:
Engineering Trust-Awareness and Self-adaptability in Services and Systems. 180-209 - Antonia Bertolino, Yves Le Traon, Francesca Lonetti, Eda Marchetti, Tejeddine Mouelhi:
Validation of Access Control Systems. 210-233 - Marianne Busch, Nora Koch, Martin Wirsing:
Evaluation of Engineering Approaches in the Secure Software Development Life Cycle. 234-265 - Antonia Bertolino, Marianne Busch, Said Daoudagh, Francesca Lonetti, Eda Marchetti:
A Toolchain for Designing and Testing Access Control Policies. 266-286 - Marina Egea, Fabian Büttner:
Verification of Authorization Policies Modified by Delegation. 287-314 - Kristian Beckers, Maritta Heisel, Bjørnar Solhaug, Ketil Stølen:
ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management System. 315-344 - Atle Refsdal, Øyvind Rideng, Bjørnar Solhaug, Ketil Stølen:
Divide and Conquer - Towards a Notion of Risk Model Encapsulation. 345-365 - Riccardo Conti, Alessio Lunardelli, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi:
Preserving Data Privacy in e-Health. 366-392
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.