All Stories

  1. Towards Explainable Access Control [BlueSky Paper]
  2. WiP: Enhancing the Comprehension of XACML Policies
  3. A Bargaining-Game Framework for Multi-Party Access Control
  4. Cognition in Social Engineering Empirical Research: a Systematic Literature Review
  5. A Comprehensive Study on Third-Party User Tracking in Mobile Applications
  6. Towards Obfuscation of Programmable Logic Controllers
  7. Mitigating Privilege Misuse in Access Control through Anomaly Detection
  8. HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems
  9. Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services
  10. Data Sharing in Social Networks
  11. The Influence of Human Factors on the Intention to Report Phishing Emails
  12. Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems
  13. Poster: A Flexible Relationship-Based Access Control Policy Generator
  14. PICO
  15. Privacy-preserving policy evaluation in multi-party access control
  16. Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection
  17. Testing the effectiveness of tailored phishing techniques in industry and academia
  18. Survey on Access Control for Community-Centered Collaborative Systems
  19. Behavior analysis in the medical sector
  20. Formal analysis of XACML policies using SMT
  21. Role Mining with Missing Values
  22. A severity-based quantification of data leakages in database systems
  23. A Hybrid Framework for Data Loss Prevention and Detection
  24. A Policy Framework for Data Fusion and Derived Data Control
  25. Risk-based Analysis of Business Process Executions
  26. An Authorization Service for Collaborative Situation Awareness
  27. Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
  28. Data Governance and Transparency for Collaborative Systems
  29. Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach
  30. An anomaly analysis framework for database systems
  31. Flow-based reputation with uncertainty: evidence-based subjective logic
  32. Preventing Information Inference in Access Control
  33. On Missing Attributes in Access Control
  34. SAFAX – An Extensible Authorization Service for Cloud Environments
  35. Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET
  36. History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation
  37. Analysis of XACML Policies with SMT
  38. Understanding Computer Security
  39. A reference model for reputation systems
  40. CollAC: Collaborative access control
  41. Data minimisation in communication protocols: a formal analysis framework and application to identity management
  42. Conviviality-driven access control policy
  43. Data Leakage Quantification
  44. Reduction of access control decisions
  45. Are On-Line Personae Really Unlinkable?
  46. Privacy Implications of Privacy Settings and Tagging in Facebook
  47. POSTER
  48. Controlling Break-the-Glass through Alignment
  49. Data reliability in home healthcare services
  50. Privacy-Aware Web Service Composition and Ranking
  51. A SEMANTIC SECURITY FRAMEWORK FOR SYSTEMS OF SYSTEMS
  52. The POLIPO Security Framework
  53. PERSONA - A Personalized Data Protection Framework
  54. Symbolic Privacy Analysis through Linkability and Detectability
  55. Privacy Analysis of User Behavior Using Alignments
  56. Privacy-Aware Web Service Composition and Ranking
  57. POSTER: TRIPLEX
  58. Policy Administration in Tag-Based Authorization
  59. Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy
  60. GEM: A distributed goal evaluation algorithm for trust management
  61. Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption
  62. FLOW-BASED REPUTATION: MORE THAN JUST RANKING
  63. Impact of ICT on Home Healthcare
  64. Measuring Privacy Compliance Using Fitness Metrics
  65. Requirements engineering within a large-scale security-oriented research project: lessons learned
  66. Measuring Privacy Compliance with Process Specifications
  67. Security Risk Management by Qualitative Vulnerability Analysis
  68. A Security Framework for Systems of Systems
  69. Formal Privacy Analysis of Communication Protocols for Identity Management
  70. Engineering Secure Software and Systems
  71. Purpose Control: Did You Process the Data for the Intended Purpose?
  72. Modeling Identity-Related Properties and Their Privacy Strength
  73. Organizational Patterns for Security and Dependability
  74. A Flexible Architecture for Privacy-Aware Trust Management
  75. Engineering and verifying agent-oriented requirements augmented by business constraints with $${\mathcal{B}}$$ -Tropos
  76. Engineering Secure Software and Systems
  77. Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology
  78. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
  79. THE SI* MODELING FRAMEWORK: METAMODEL AND APPLICATIONS
  80. S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System
  81. POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy
  82. Towards the development of privacy-aware systems
  83. Engineering Secure Software and Systems
  84. Goal-Equivalent Secure Business Process Re-engineering
  85. A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
  86. Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
  87. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
  88. Why Eliciting and Managing Legal Requirements Is Hard
  89. Requirements model generation to support requirements elicitation: the Secure Tropos experience
  90. Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
  91. ${\cal B}$ -Tropos
  92. Perceived risk assessment
  93. An evaluation of business solutions in manufacturing enterprises
  94. Computer-aided Support for Secure Tropos
  95. FROM HIPPOCRATIC DATABASES TO SECURE TROPOS: A COMPUTER-AIDED RE-ENGINEERING APPROACH
  96. From Trust to Dependability through Risk Analysis
  97. How to capture, model, and verify the knowledge of legal, security, and privacy experts
  98. Detecting Conflicts of Interest
  99. Requirements engineering for trust management: model, methodology, and reasoning
  100. Hierarchical hippocratic databases with minimal disclosure for virtual organizations
  101. Privacy Is Linking Permission to Purpose
  102. Creating Objects in the Flexible Authorization Framework
  103. Designing Security Requirements Models Through Planning
  104. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
  105. Modeling Social and Individual Trust in Requirements Engineering Methodologies
  106. Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
  107. Security and Trust Requirements Engineering
  108. Maintaining privacy on derived objects
  109. Modeling security requirements through ownership, permission and delegation
  110. ST-tool: a CASE tool for security requirements engineering
  111. ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
  112. Requirements Engineering Meets Trust Management
  113. Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
  114. An Ontology for Secure Socio-Technical Systems
  115. An Ontology for Secure Socio-Technical Systems
  116. Formal Analysis of BPMN Via a Translation into COWS
  117. Reasoning About Risk in Agent’s Deliberation Process: A Jadex Implementation
  118. Privacy-Aware Web Service Composition and Ranking
  119. Organizational Patterns for Security and Dependability
  120. A Model-Driven Approach for the Specification and Analysis of Access Control Policies
  121. Modelling Security and Trust with Secure Tropos
  122. Modelling Security and Trust with Secure Tropos
  123. Modelling Security and Trust with Secure Tropos
  124. Modelling Security and Trust with Secure Tropos