All Stories

  1. Cognition in Social Engineering Empirical Research: a Systematic Literature Review
  2. A Comprehensive Study on Third-Party User Tracking in Mobile Applications
  3. Towards Obfuscation of Programmable Logic Controllers
  4. Mitigating Privilege Misuse in Access Control through Anomaly Detection
  5. HoneyICS: A High-interaction Physics-aware Honeynet for Industrial Control Systems
  6. Privacy-Preserving Multi-Party Access Control for Third-Party UAV Services
  7. Data Sharing in Social Networks
  8. The Influence of Human Factors on the Intention to Report Phishing Emails
  9. Towards A High-interaction Physics-aware Honeynet for Industrial Control Systems
  10. Poster: A Flexible Relationship-Based Access Control Policy Generator
  11. PICO
  12. Privacy-preserving policy evaluation in multi-party access control
  13. Combining Text and Visual Features to Improve the Identification of Cloned Webpages for Early Phishing Detection
  14. Testing the effectiveness of tailored phishing techniques in industry and academia
  15. Survey on Access Control for Community-Centered Collaborative Systems
  16. Behavior analysis in the medical sector
  17. Formal analysis of XACML policies using SMT
  18. Role Mining with Missing Values
  19. A severity-based quantification of data leakages in database systems
  20. A Hybrid Framework for Data Loss Prevention and Detection
  21. A Policy Framework for Data Fusion and Derived Data Control
  22. Risk-based Analysis of Business Process Executions
  23. An Authorization Service for Collaborative Situation Awareness
  24. Collaborative Access Decisions: Why Has My Decision Not Been Enforced?
  25. Data Governance and Transparency for Collaborative Systems
  26. Constructing Probable Explanations of Nonconformity: A Data-Aware and History-Based Approach
  27. An anomaly analysis framework for database systems
  28. Flow-based reputation with uncertainty: evidence-based subjective logic
  29. Preventing Information Inference in Access Control
  30. On Missing Attributes in Access Control
  31. SAFAX – An Extensible Authorization Service for Cloud Environments
  32. Pre-Distribution of Certificates for Pseudonymous Broadcast Authentication in VANET
  33. History-Based Construction of Alignments for Conformance Checking: Formalization and Implementation
  34. Analysis of XACML Policies with SMT
  35. Understanding Computer Security
  36. A reference model for reputation systems
  37. CollAC: Collaborative access control
  38. Data minimisation in communication protocols: a formal analysis framework and application to identity management
  39. Conviviality-driven access control policy
  40. Data Leakage Quantification
  41. Reduction of access control decisions
  42. Are On-Line Personae Really Unlinkable?
  43. Privacy Implications of Privacy Settings and Tagging in Facebook
  44. POSTER
  45. Controlling Break-the-Glass through Alignment
  46. Data reliability in home healthcare services
  47. Privacy-Aware Web Service Composition and Ranking
  48. A SEMANTIC SECURITY FRAMEWORK FOR SYSTEMS OF SYSTEMS
  49. The POLIPO Security Framework
  50. PERSONA - A Personalized Data Protection Framework
  51. Symbolic Privacy Analysis through Linkability and Detectability
  52. Privacy Analysis of User Behavior Using Alignments
  53. Privacy-Aware Web Service Composition and Ranking
  54. POSTER: TRIPLEX
  55. Policy Administration in Tag-Based Authorization
  56. Formal Modelling of (De)Pseudonymisation: A Case Study in Health Care Privacy
  57. GEM: A distributed goal evaluation algorithm for trust management
  58. Enforcing Access Control in Virtual Organizations Using Hierarchical Attribute-Based Encryption
  59. FLOW-BASED REPUTATION: MORE THAN JUST RANKING
  60. Impact of ICT on Home Healthcare
  61. Measuring Privacy Compliance Using Fitness Metrics
  62. Requirements engineering within a large-scale security-oriented research project: lessons learned
  63. Measuring Privacy Compliance with Process Specifications
  64. Security Risk Management by Qualitative Vulnerability Analysis
  65. A Security Framework for Systems of Systems
  66. Formal Privacy Analysis of Communication Protocols for Identity Management
  67. Engineering Secure Software and Systems
  68. Purpose Control: Did You Process the Data for the Intended Purpose?
  69. Modeling Identity-Related Properties and Their Privacy Strength
  70. Organizational Patterns for Security and Dependability
  71. A Flexible Architecture for Privacy-Aware Trust Management
  72. Engineering and verifying agent-oriented requirements augmented by business constraints with $${\mathcal{B}}$$ -Tropos
  73. Engineering Secure Software and Systems
  74. Security Requirements Engineering: The SI* Modeling Language and the Secure Tropos Methodology
  75. A vulnerability-centric requirements engineering framework: analyzing security attacks, countermeasures, and requirements based on vulnerabilities
  76. THE SI* MODELING FRAMEWORK: METAMODEL AND APPLICATIONS
  77. S&D Pattern Deployment at Organizational Level: A Prototype for Remote Healthcare System
  78. POLIPO: Policies & OntoLogies for Interoperability, Portability, and autOnomy
  79. Towards the development of privacy-aware systems
  80. Engineering Secure Software and Systems
  81. Goal-Equivalent Secure Business Process Re-engineering
  82. A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
  83. Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control
  84. How to integrate legal requirements into a requirements engineering methodology for the development of security and privacy patterns
  85. Why Eliciting and Managing Legal Requirements Is Hard
  86. Requirements model generation to support requirements elicitation: the Secure Tropos experience
  87. Risk as Dependability Metrics for the Evaluation of Business Solutions: A Model-driven Approach
  88. ${\cal B}$ -Tropos
  89. Perceived risk assessment
  90. An evaluation of business solutions in manufacturing enterprises
  91. Computer-aided Support for Secure Tropos
  92. FROM HIPPOCRATIC DATABASES TO SECURE TROPOS: A COMPUTER-AIDED RE-ENGINEERING APPROACH
  93. From Trust to Dependability through Risk Analysis
  94. How to capture, model, and verify the knowledge of legal, security, and privacy experts
  95. Detecting Conflicts of Interest
  96. Requirements engineering for trust management: model, methodology, and reasoning
  97. Hierarchical hippocratic databases with minimal disclosure for virtual organizations
  98. Privacy Is Linking Permission to Purpose
  99. Creating Objects in the Flexible Authorization Framework
  100. Designing Security Requirements Models Through Planning
  101. Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
  102. Modeling Social and Individual Trust in Requirements Engineering Methodologies
  103. Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
  104. Security and Trust Requirements Engineering
  105. Maintaining privacy on derived objects
  106. Modeling security requirements through ownership, permission and delegation
  107. ST-tool: a CASE tool for security requirements engineering
  108. ST-Tool: A CASE Tool for Modeling and Analyzing Trust Requirements
  109. Requirements Engineering Meets Trust Management
  110. Filling the Gap between Requirements Engineering and Public Key/Trust Management Infrastructures
  111. An Ontology for Secure Socio-Technical Systems
  112. An Ontology for Secure Socio-Technical Systems
  113. Formal Analysis of BPMN Via a Translation into COWS
  114. Reasoning About Risk in Agent’s Deliberation Process: A Jadex Implementation
  115. Privacy-Aware Web Service Composition and Ranking
  116. Organizational Patterns for Security and Dependability
  117. A Model-Driven Approach for the Specification and Analysis of Access Control Policies
  118. Modelling Security and Trust with Secure Tropos
  119. Modelling Security and Trust with Secure Tropos
  120. Modelling Security and Trust with Secure Tropos
  121. Modelling Security and Trust with Secure Tropos