close
1.

電子ブック

EB
Fabio Massacci, Takeo Kanade, Samuel T. Redwine, Nicola Zannone
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
2.

電子ブック

EB
Fabio Massacci, Takeo Kanade, Dan Wallach, Nicola Zannone, Association for Computing Machinery-Digital Library.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Attack Analysis and Prevention I / Session 1:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks / Francesco Gadaleta ; Yves Younan ; Wouter Joosen
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests / Philippe De Ryck ; Lieven Desmet ; Thomas Heyman ; Frank Piessens
Idea: Opcode-Sequence-Based Malware Detection / Igor Santos ; Felix Brezo ; Javier Nieves ; Yoseba K. Penya ; Borja Sanz ; Carlos Laorden ; Pablo G. Bringas
Attack Analysis and Prevention II / Session 2:
Experiences with PDG-Based IFC / Christian Hammer
Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications / James Walden ; Maureen Doyle ; Robert Lenhof ; John Murray
Idea: Towards Architecture-Centric Security Analysis of Software / Karsten Sohr ; Bernhard Berger
Policy Verification and Enforcement I / Session 3:
Formally-Based Black-Box Monitoring of Security Protocols / Alfredo Pironti ; Jan Jürjens
Secure Code Generation for Web Applications / Martin Johns ; Christian Beyerlein ; Rosemaria Giesecke ; Joachim Posegga
Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation / Per Håkon Meland ; Inger Anne Tøndel ; Jostein Jensen
Policy Verification and Enforcement II / Session 4:
Model-Driven Security Policy Deployment: Property Oriented Approach / Stere Preda ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Joaquin Garcia-Alfaro ; Laurent Toutain
Category-Based Authorisation Models: Operational Semantics and Expressive Power / Clara Bertolissi ; Maribel Fernández
Idea: Efficient Evaluation of Access Control Constraints / Achim D. Brucker ; Helmut Petritsch
Secure System and Software Development I / Session 5:
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach / Nina Moebius ; Kurt Stenzel ; Wolfgang Reif
Idea: Enforcing Consumer-Specified Security Properties for Modular Software / Giacomo A. Galilei ; Vincenzo Gervasi
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks / Ben Smith ; Laurie Williams ; Andrew Austin
Secure System and Software Development II / Session 6:
Automatic Generation of Smart, Security-Aware GUI Models / David Basin ; Manuel Clavel ; Marina Egea ; Michael Schläpfer
Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems / Albin Zuccato ; Nils Daniels ; Cheevarat Jampathom ; Mikael Nilson
Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality / Aida Omerovic ; Anette Andresen ; Håvard Grindheim ; Per Myrseth ; Atle Refsdal ; Ketil Stølen ; Jon Ølnes
Author Index
Attack Analysis and Prevention I / Session 1:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks / Francesco Gadaleta ; Yves Younan ; Wouter Joosen
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests / Philippe De Ryck ; Lieven Desmet ; Thomas Heyman ; Frank Piessens
3.

電子ブック

EB
?lfar Erlingsson, Takeo Kanade, Roel Wieringa, Nicola Zannone, Association for Computing Machinery-Digital Library.
出版情報: Springer eBooks Computer Science , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Model-Based Security I / Session 1:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations / Benjamin Aziz ; Alvaro E. Arenas ; Michael Wilson
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy / David Power ; Mark Slaymaker ; Andrew Simpson
Security Validation of Business Processes via Model-Checking / Wihem Arsac ; Luca Compagna ; Giancarlo Pellegrino ; Serena Elisa Ponta
Tools and Mechanisms / Session 2:
On-Device Control Flow Verification for Java Programs / Arnaud Fontaine ; Samuel Hym ; Isabelle Simplot-Ryl
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations / Ricardo Corin ; Felipe Andrés Manzano
Predictability of Enforcement / Nataliia Bielova ; Fabio Massacci
Web Security / Session 3:
SessionShield: Lightweight Protection against Session Hijacking / Nick Nikiforakis ; Wannes Meert ; Yves Younan ; Martin Johns ; Wouter Joosen
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications / Thanh Binh Dao ; Etsuya Shibayama
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications / Philippe De Ryck ; Lieven Desmet
Model-Based Security II / Sesssion 4:
Lightweight Modeling and Analysis of Security Concepts / Jörn Eichler
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications / Linda Ariani Gunawan ; Frank Alexander Kraemer ; Peter Herrmann
An Architecture-Centric Approach to Detecting Security Patterns in software / Michaela Bunke ; Karsten Sohr
Security Requirements Engineering / Session 5:
The Security Twin Peaks / Thomas Heyman ; Koen Yskout ; Riccardo Scandariato ; Holger Schmidt ; Yijun Yu
Evolution of Security Requirements Tests for Service-Centric Systems / Michael Felderer ; Berthold Agreiter ; Ruth Breu
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes / Stephan Neuhaus ; Viet Hung Nguyen
Authorization / Session 6:
Authorization Enforcement Usability Case Study / Steffen Bartsch
Scalable Authorization Middleware for Service Oriented Architectures / Tom Goovaerts
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models / Naveed Ahmed ; Christian D. Jensen
Ideas / Session 7:
Idea: Interactive Support for Secure Software Development / Jing Xie ; Bill Chu ; Heather Richter Lipford
Idea: A Reference Platform for Systematic Information Security Management Tool Support / Ingo Müller ; Jun Han ; Jean-Guy Schneider ; Steven Versteeg
Idea: Simulation Based Security Requirement Verification for Transaction Level Models / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner
Author Index
Model-Based Security I / Session 1:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations / Benjamin Aziz ; Alvaro E. Arenas ; Michael Wilson
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy / David Power ; Mark Slaymaker ; Andrew Simpson
4.

電子ブック

EB
Úlfar Erlingsson, Takeo Kanade, Roel Wieringa, Nicola Zannone, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Model-Based Security I / Session 1:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations / Benjamin Aziz ; Alvaro E. Arenas ; Michael Wilson
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy / David Power ; Mark Slaymaker ; Andrew Simpson
Security Validation of Business Processes via Model-Checking / Wihem Arsac ; Luca Compagna ; Giancarlo Pellegrino ; Serena Elisa Ponta
Tools and Mechanisms / Session 2:
On-Device Control Flow Verification for Java Programs / Arnaud Fontaine ; Samuel Hym ; Isabelle Simplot-Ryl
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations / Ricardo Corin ; Felipe Andrés Manzano
Predictability of Enforcement / Nataliia Bielova ; Fabio Massacci
Web Security / Session 3:
SessionShield: Lightweight Protection against Session Hijacking / Nick Nikiforakis ; Wannes Meert ; Yves Younan ; Martin Johns ; Wouter Joosen
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications / Thanh Binh Dao ; Etsuya Shibayama
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications / Philippe De Ryck ; Lieven Desmet
Model-Based Security II / Sesssion 4:
Lightweight Modeling and Analysis of Security Concepts / Jörn Eichler
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications / Linda Ariani Gunawan ; Frank Alexander Kraemer ; Peter Herrmann
An Architecture-Centric Approach to Detecting Security Patterns in software / Michaela Bunke ; Karsten Sohr
Security Requirements Engineering / Session 5:
The Security Twin Peaks / Thomas Heyman ; Koen Yskout ; Riccardo Scandariato ; Holger Schmidt ; Yijun Yu
Evolution of Security Requirements Tests for Service-Centric Systems / Michael Felderer ; Berthold Agreiter ; Ruth Breu
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes / Stephan Neuhaus ; Viet Hung Nguyen
Authorization / Session 6:
Authorization Enforcement Usability Case Study / Steffen Bartsch
Scalable Authorization Middleware for Service Oriented Architectures / Tom Goovaerts
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models / Naveed Ahmed ; Christian D. Jensen
Ideas / Session 7:
Idea: Interactive Support for Secure Software Development / Jing Xie ; Bill Chu ; Heather Richter Lipford
Idea: A Reference Platform for Systematic Information Security Management Tool Support / Ingo Müller ; Jun Han ; Jean-Guy Schneider ; Steven Versteeg
Idea: Simulation Based Security Requirement Verification for Transaction Level Models / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner
Author Index
Model-Based Security I / Session 1:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations / Benjamin Aziz ; Alvaro E. Arenas ; Michael Wilson
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy / David Power ; Mark Slaymaker ; Andrew Simpson
5.

電子ブック

EB
Fabio Massacci, Takeo Kanade, Dan Wallach, Nicola Zannone, Association for Computing Machinery-Digital Library.
出版情報: ACM Digital Library Proceedings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Attack Analysis and Prevention I / Session 1:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks / Francesco Gadaleta ; Yves Younan ; Wouter Joosen
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests / Philippe De Ryck ; Lieven Desmet ; Thomas Heyman ; Frank Piessens
Idea: Opcode-Sequence-Based Malware Detection / Igor Santos ; Felix Brezo ; Javier Nieves ; Yoseba K. Penya ; Borja Sanz ; Carlos Laorden ; Pablo G. Bringas
Attack Analysis and Prevention II / Session 2:
Experiences with PDG-Based IFC / Christian Hammer
Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications / James Walden ; Maureen Doyle ; Robert Lenhof ; John Murray
Idea: Towards Architecture-Centric Security Analysis of Software / Karsten Sohr ; Bernhard Berger
Policy Verification and Enforcement I / Session 3:
Formally-Based Black-Box Monitoring of Security Protocols / Alfredo Pironti ; Jan Jürjens
Secure Code Generation for Web Applications / Martin Johns ; Christian Beyerlein ; Rosemaria Giesecke ; Joachim Posegga
Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation / Per Håkon Meland ; Inger Anne Tøndel ; Jostein Jensen
Policy Verification and Enforcement II / Session 4:
Model-Driven Security Policy Deployment: Property Oriented Approach / Stere Preda ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Joaquin Garcia-Alfaro ; Laurent Toutain
Category-Based Authorisation Models: Operational Semantics and Expressive Power / Clara Bertolissi ; Maribel Fernández
Idea: Efficient Evaluation of Access Control Constraints / Achim D. Brucker ; Helmut Petritsch
Secure System and Software Development I / Session 5:
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach / Nina Moebius ; Kurt Stenzel ; Wolfgang Reif
Idea: Enforcing Consumer-Specified Security Properties for Modular Software / Giacomo A. Galilei ; Vincenzo Gervasi
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks / Ben Smith ; Laurie Williams ; Andrew Austin
Secure System and Software Development II / Session 6:
Automatic Generation of Smart, Security-Aware GUI Models / David Basin ; Manuel Clavel ; Marina Egea ; Michael Schläpfer
Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems / Albin Zuccato ; Nils Daniels ; Cheevarat Jampathom ; Mikael Nilson
Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality / Aida Omerovic ; Anette Andresen ; Håvard Grindheim ; Per Myrseth ; Atle Refsdal ; Ketil Stølen ; Jon Ølnes
Author Index
Attack Analysis and Prevention I / Session 1:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks / Francesco Gadaleta ; Yves Younan ; Wouter Joosen
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests / Philippe De Ryck ; Lieven Desmet ; Thomas Heyman ; Frank Piessens
6.

電子ブック

EB
Fabio Massacci, Takeo Kanade, Samuel T. Redwine, Nicola Zannone, Samuel Redwine
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2009
所蔵情報: loading…
7.

電子ブック

EB
Fabio Massacci, Takeo Kanade, Dan Wallach, Nicola Zannone, Association for Computing Machinery-Digital Library.
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2010
所蔵情報: loading…
目次情報: 続きを見る
Attack Analysis and Prevention I / Session 1:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks / Francesco Gadaleta ; Yves Younan ; Wouter Joosen
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests / Philippe De Ryck ; Lieven Desmet ; Thomas Heyman ; Frank Piessens
Idea: Opcode-Sequence-Based Malware Detection / Igor Santos ; Felix Brezo ; Javier Nieves ; Yoseba K. Penya ; Borja Sanz ; Carlos Laorden ; Pablo G. Bringas
Attack Analysis and Prevention II / Session 2:
Experiences with PDG-Based IFC / Christian Hammer
Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications / James Walden ; Maureen Doyle ; Robert Lenhof ; John Murray
Idea: Towards Architecture-Centric Security Analysis of Software / Karsten Sohr ; Bernhard Berger
Policy Verification and Enforcement I / Session 3:
Formally-Based Black-Box Monitoring of Security Protocols / Alfredo Pironti ; Jan Jürjens
Secure Code Generation for Web Applications / Martin Johns ; Christian Beyerlein ; Rosemaria Giesecke ; Joachim Posegga
Idea: Reusability of Threat Models - Two Approaches with an Experimental Evaluation / Per Håkon Meland ; Inger Anne Tøndel ; Jostein Jensen
Policy Verification and Enforcement II / Session 4:
Model-Driven Security Policy Deployment: Property Oriented Approach / Stere Preda ; Nora Cuppens-Boulahia ; Frédéric Cuppens ; Joaquin Garcia-Alfaro ; Laurent Toutain
Category-Based Authorisation Models: Operational Semantics and Expressive Power / Clara Bertolissi ; Maribel Fernández
Idea: Efficient Evaluation of Access Control Constraints / Achim D. Brucker ; Helmut Petritsch
Secure System and Software Development I / Session 5:
Formal Verification of Application-Specific Security Properties in a Model-Driven Approach / Nina Moebius ; Kurt Stenzel ; Wolfgang Reif
Idea: Enforcing Consumer-Specified Security Properties for Modular Software / Giacomo A. Galilei ; Vincenzo Gervasi
Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks / Ben Smith ; Laurie Williams ; Andrew Austin
Secure System and Software Development II / Session 6:
Automatic Generation of Smart, Security-Aware GUI Models / David Basin ; Manuel Clavel ; Marina Egea ; Michael Schläpfer
Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems / Albin Zuccato ; Nils Daniels ; Cheevarat Jampathom ; Mikael Nilson
Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality / Aida Omerovic ; Anette Andresen ; Håvard Grindheim ; Per Myrseth ; Atle Refsdal ; Ketil Stølen ; Jon Ølnes
Author Index
Attack Analysis and Prevention I / Session 1:
BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks / Francesco Gadaleta ; Yves Younan ; Wouter Joosen
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests / Philippe De Ryck ; Lieven Desmet ; Thomas Heyman ; Frank Piessens
8.

電子ブック

EB
Úlfar Erlingsson, Takeo Kanade, Roel Wieringa, Nicola Zannone, Association for Computing Machinery-Digital Library.
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2011
所蔵情報: loading…
目次情報: 続きを見る
Model-Based Security I / Session 1:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations / Benjamin Aziz ; Alvaro E. Arenas ; Michael Wilson
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy / David Power ; Mark Slaymaker ; Andrew Simpson
Security Validation of Business Processes via Model-Checking / Wihem Arsac ; Luca Compagna ; Giancarlo Pellegrino ; Serena Elisa Ponta
Tools and Mechanisms / Session 2:
On-Device Control Flow Verification for Java Programs / Arnaud Fontaine ; Samuel Hym ; Isabelle Simplot-Ryl
Efficient Symbolic Execution for Analysing Cryptographic Protocol Implementations / Ricardo Corin ; Felipe Andrés Manzano
Predictability of Enforcement / Nataliia Bielova ; Fabio Massacci
Web Security / Session 3:
SessionShield: Lightweight Protection against Session Hijacking / Nick Nikiforakis ; Wannes Meert ; Yves Younan ; Martin Johns ; Wouter Joosen
Security Sensitive Data Flow Coverage Criterion for Automatic Security Testing of Web Applications / Thanh Binh Dao ; Etsuya Shibayama
Middleware Support for Complex and Distributed Security Services in Multi-tier Web Applications / Philippe De Ryck ; Lieven Desmet
Model-Based Security II / Sesssion 4:
Lightweight Modeling and Analysis of Security Concepts / Jörn Eichler
A Tool-Supported Method for the Design and Implementation of Secure Distributed Applications / Linda Ariani Gunawan ; Frank Alexander Kraemer ; Peter Herrmann
An Architecture-Centric Approach to Detecting Security Patterns in software / Michaela Bunke ; Karsten Sohr
Security Requirements Engineering / Session 5:
The Security Twin Peaks / Thomas Heyman ; Koen Yskout ; Riccardo Scandariato ; Holger Schmidt ; Yijun Yu
Evolution of Security Requirements Tests for Service-Centric Systems / Michael Felderer ; Berthold Agreiter ; Ruth Breu
After-Life Vulnerabilities: A Study on Firefox Evolution, Its Vulnerabilities, and Fixes / Stephan Neuhaus ; Viet Hung Nguyen
Authorization / Session 6:
Authorization Enforcement Usability Case Study / Steffen Bartsch
Scalable Authorization Middleware for Service Oriented Architectures / Tom Goovaerts
Adaptable Authentication Model: Exploring Security with Weaker Attacker Models / Naveed Ahmed ; Christian D. Jensen
Ideas / Session 7:
Idea: Interactive Support for Secure Software Development / Jing Xie ; Bill Chu ; Heather Richter Lipford
Idea: A Reference Platform for Systematic Information Security Management Tool Support / Ingo Müller ; Jun Han ; Jean-Guy Schneider ; Steven Versteeg
Idea: Simulation Based Security Requirement Verification for Transaction Level Models / Johannes Loinig ; Christian Steger ; Reinhold Weiss ; Ernst Haselsteiner
Author Index
Model-Based Security I / Session 1:
Model-Based Refinement of Security Policies in Collaborative Virtual Organisations / Benjamin Aziz ; Alvaro E. Arenas ; Michael Wilson
Automatic Conformance Checking of Role-Based Access Control Policies via Alloy / David Power ; Mark Slaymaker ; Andrew Simpson
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼