All Stories

  1. WiP: Enhancing the Comprehension of XACML Policies
  2. A Bargaining-Game Framework for Multi-Party Access Control
  3. Cognition in Social Engineering Empirical Research: a Systematic Literature Review
  4. A Comprehensive Study on Third-Party User Tracking in Mobile Applications
  5. Towards Obfuscation of Programmable Logic Controllers
  6. Mitigating Privilege Misuse in Access Control through Anomaly Detection
  7. HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems
  8. Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services
  9. Data Sharing in Social Networks
  10. The Influence of Human Factors on the Intention to Report Phishing Emails
  11. Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems
  12. Poster: A Flexible Relationship-Based Access Control Policy Generator
  13. PICO
  14. Privacy-preserving policy evaluation in multi-party access control
  15. Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection
  16. Testing the effectiveness of tailored phishing techniques in industry and academia
  17. Survey on Access Control for Community-Centered Collaborative Systems
  18. Behavior analysis in the medical sector
  19. Formal analysis of XACML policies using SMT
  20. Role Mining with Missing Values
  21. A severity-based quantification of data leakages in database systems
  22. A Hybrid Framework for Data Loss Prevention and Detection
  23. A Policy Framework for Data Fusion and Derived Data Control
  24. Risk-based Analysis of Business Process Executions
  25. An Authorization Service for Collaborative Situation Awareness
  26. Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
  27. Data Governance and Transparency for Collaborative Systems
  28. Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach
  29. An anomaly analysis framework for database systems
  30. Flow-based reputation with uncertainty: evidence-based subjective logic
  31. Preventing Information Inference in Access Control
  32. On Missing Attributes in Access Control
  33. SAFAX – An Extensible Authorization Service for Cloud Environments
  34. Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET
  35. History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation
  36. Analysis of XACML Policies with SMT
  37. Understanding Computer Security
  38. A reference model for reputation systems
  39. CollAC: Collaborative access control
  40. Data minimisation in communication protocols: a formal analysis framework and application to identity management
  41. Conviviality-driven access control policy
  42. Data Leakage Quantification
  43. Reduction of access control decisions
  44. Are On-Line Personae Really Unlinkable?
  45. Privacy Implications of Privacy Settings and Tagging in Facebook
  46. POSTER
  47. Controlling Break-the-Glass through Alignment
  48. Data reliability in home healthcare services
  49. Privacy-Aware Web Service Composition and Ranking
  50. A SEMANTIC SECURITY FRAMEWORK FOR SYSTEMS OF SYSTEMS
  51. The POLIPO Security Framework
  52. PERSONA - A Personalized Data Protection Framework
  53. Symbolic Privacy Analysis through Linkability and Detectability
  54. Privacy Analysis of User Behavior Using Alignments
  55. Privacy-Aware Web Service Composition and Ranking
  56. POSTER: TRIPLEX
  57. Policy Administration in Tag-Based Authorization
  58. Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy
  59. GEM: A distributed goal evaluation algorithm for trust management
  60. Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption
  61. FLOW-BASED REPUTATION: MORE THAN JUST RANKING
  62. Impact of ICT on Home Healthcare
  63. Measuring Privacy Compliance Using Fitness Metrics
  64. Requirements engineering within a large-scale security-oriented research project: lessons learned
  65. Measuring Privacy Compliance with Process Specifications
  66. Security Risk Management by Qualitative Vulnerability Analysis
  67. A Security Framework for Systems of Systems
  68. Formal Privacy Analysis of Communication Protocols for Identity Management
  69. Engineering Secure Software and Systems
  70. Purpose Control: Did You Process the Data for the Intended Purpose?
  71. Modeling Identity-Related Properties and Their Privacy Strength
  72. Organizational Patterns for Security and Dependability
  73. A Flexible Architecture for Privacy-Aware Trust Management
  74. Engineering and verifying agent-oriented requirements augmented by business constraints with $${\mathcal{B}}$$ -Tropos
  75. Engineering Secure Software and Systems
  76. Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology
  77. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
  78. THE SI* MODELING FRAMEWORK: METAMODEL AND APPLICATIONS
  79. S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System
  80. POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy
  81. Towards the development of privacy-aware systems
  82. Engineering Secure Software and Systems
  83. Goal-Equivalent Secure Business Process Re-engineering
  84. A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
  85. Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
  86. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
  87. Why Eliciting and Managing Legal Requirements Is Hard
  88. Requirements model generation to support requirements elicitation: the Secure Tropos experience
  89. Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
  90. ${\cal B}$ -Tropos
  91. Perceived risk assessment
  92. An evaluation of business solutions in manufacturing enterprises
  93. Computer-aided Support for Secure Tropos
  94. FROM HIPPOCRATIC DATABASES TO SECURE TROPOS: A COMPUTER-AIDED RE-ENGINEERING APPROACH
  95. From Trust to Dependability through Risk Analysis
  96. How to capture, model, and verify the knowledge of legal, security, and privacy experts
  97. Detecting Conflicts of Interest
  98. Requirements engineering for trust management: model, methodology, and reasoning
  99. Hierarchical hippocratic databases with minimal disclosure for virtual organizations
  100. Privacy Is Linking Permission to Purpose
  101. Creating Objects in the Flexible Authorization Framework
  102. Designing Security Requirements Models Through Planning
  103. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
  104. Modeling Social and Individual Trust in Requirements Engineering Methodologies
  105. Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
  106. Security and Trust Requirements Engineering
  107. Maintaining privacy on derived objects
  108. Modeling security requirements through ownership, permission and delegation
  109. ST-tool: a CASE tool for security requirements engineering
  110. ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
  111. Requirements Engineering Meets Trust Management
  112. Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
  113. An Ontology for Secure Socio-Technical Systems
  114. An Ontology for Secure Socio-Technical Systems
  115. Formal Analysis of BPMN Via a Translation into COWS
  116. Reasoning About Risk in Agent’s Deliberation Process: A Jadex Implementation
  117. Privacy-Aware Web Service Composition and Ranking
  118. Organizational Patterns for Security and Dependability
  119. A Model-Driven Approach for the Specification and Analysis of Access Control Policies
  120. Modelling Security and Trust with Secure Tropos
  121. Modelling Security and Trust with Secure Tropos
  122. Modelling Security and Trust with Secure Tropos
  123. Modelling Security and Trust with Secure Tropos