CRiSIS C

20 papers

YearTitle / Authors
2009A formal design of secure information systems by using a Formal Secure Data Flow Diagram (FSDFD).
Nadia Soudani, Bel G. Raggad, Belhassen Zouari
2009A formal methodology for detection of vulnerabilities in an enterprise information system.
Anirban Sengupta, Chandan Mazumdar, Aditya Bagchi
2009A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environment.
Philippe Balbiani, Yannick Chevalier, Marwa El Houri
2009A quantitative approach to assess information security related risks.
Anton Romanov, Eiji Okamoto
2009A reference model for risk-aware business process management.
Stefan Jakoubi, Simon Tjoa
2009A secured delegation of remote services on IPv6 home networks.
Stere Preda, Laurent Toutain, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro
2009CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009
Anas Abou El Kalam, Yves Deswarte, Mahmoud Mostafa
2009CryptoNET: Secure federation protocol and authorization policies for SMI.
Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer
2009Data disclosure risk evaluation.
Slim Trabelsi, Vincent Salzgeber, Michele Bezzi, Gilles Montagnon
2009Experiments and data analysis of electronic voting system.
Komminist Weldemariam, Adolfo Villafiorita, Andrea Mattioli
2009Formal analysis of attacks for e-voting system.
Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita
2009Greylisting - long term analysis of anti-SPAM effect.
Tomas Sochor
2009Honeypot router for routing protocols protection.
Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula
2009Modeling dependencies in security risk management.
Tansu Alpcan, Nicholas Bambos
2009Permutation-based steganographic channels.
Kevin Forest, Scott Knight
2009Re-inforced stealth breakpoints.
Amit Vasudevan
2009Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco networks.
Andrea Bobbio, Ester Ciancamerla, Saverio Di Blasi, Alessandro Iacomini, Federico Mari, Igor Melatti, Michele Minichino, Alessandro Scarlatti, Enrico Tronci, Roberta Terruggia, Emilio Zendri
2009Runtime verification of declassification for imperative programs: Formal foundations.
Thomas Demongeot, Julien Mallet, Yves Le Traon
2009SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data.
Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel
2009Untrustworthiness: A trust-based security metric.
Afonso Araújo Neto, Marco Vieira