default search action
International Journal of Secure Software Engineering, Volume 2
Volume 2, Number 1, 2011
- Alastair Nisbet, Mohammed A. Rashid:
Performance Evaluation of Secure Key Deployment and Exchange Protocol for MANETs. 1-21 - Sean Policarpio, Yan Zhang:
A Formal Language for XML Authorisations Based on Answer Set Programming and Temporal Interval Logic Constraints. 22-39 - Christian Schwarzl, Edgar R. Weippl:
A Systematic Empirical Analysis of Forging Fingerprints to Fool Biometric Systems. 40-83
Volume 2, Number 2, 2011
- Kim Wuyts, Riccardo Scandariato, Griet Verhenneman, Wouter Joosen:
Integrating Patient Consent in e-Health Access Control. 1-24 - Wesam Darwish, Konstantin Beznosov:
Analysis of ANSI RBAC Support in EJB. 25-52 - Jan Durand, Juan Flores, Travis Atkison, Nicholas A. Kraft, Randy K. Smith:
Using Executable Slicing to Improve Rogue Software Detection Algorithms. 53-64 - Yun Bai, Khaled M. Khan:
Ell Secure Information System Using Modal Logic Technique. 65-76
Volume 2, Number 3, 2011
- Yudistira Asnar, Fabio Massacci, Ayda Saïdane, Carlo Riccucci, Massimo Felici, Alessandra Tedeschi, Paul El Khoury, Keqin Li, Magali Seguran, Nicola Zannone:
Organizational Patterns for Security and Dependability: From Design to Application. 1-22 - Haralambos Mouratidis, Miao Kang:
Secure by Design: Developing Secure Software Systems from the Ground Up. 23-41 - Afonso Araújo Neto, Marco Vieira:
Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support. 42-62 - Walid Al-Ahmad:
Building Secure Software Using XP. 63-76
Volume 2, Number 4, 2011
- Shamal Faily, Ivan Flechais:
Eliciting Policy Requirements for Critical National Infrastructure Using the IRIS Framework. 1-18 - Christian Jung, Manuel Rudolph, Reinhard Schwarz:
Security Evaluation of Service-Oriented Systems Using the SiSOA Method. 19-33 - Matteo Avalle, Alfredo Pironti, Davide Pozza, Riccardo Sisto:
JavaSPI: A Framework for Security Protocol Implementation. 34-48 - Jostein Jensen, Martin Gilje Jaatun:
Not Ready for Prime Time: A Survey on Security in Model Driven Development. 49-61
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.