| 2009 | A formal design of secure information systems by using a Formal Secure Data Flow Diagram (FSDFD). Nadia Soudani, Bel G. Raggad, Belhassen Zouari |
| 2009 | A formal methodology for detection of vulnerabilities in an enterprise information system. Anirban Sengupta, Chandan Mazumdar, Aditya Bagchi |
| 2009 | A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environment. Philippe Balbiani, Yannick Chevalier, Marwa El Houri |
| 2009 | A quantitative approach to assess information security related risks. Anton Romanov, Eiji Okamoto |
| 2009 | A reference model for risk-aware business process management. Stefan Jakoubi, Simon Tjoa |
| 2009 | A secured delegation of remote services on IPv6 home networks. Stere Preda, Laurent Toutain, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro |
| 2009 | CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009 Anas Abou El Kalam, Yves Deswarte, Mahmoud Mostafa |
| 2009 | CryptoNET: Secure federation protocol and authorization policies for SMI. Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer |
| 2009 | Data disclosure risk evaluation. Slim Trabelsi, Vincent Salzgeber, Michele Bezzi, Gilles Montagnon |
| 2009 | Experiments and data analysis of electronic voting system. Komminist Weldemariam, Adolfo Villafiorita, Andrea Mattioli |
| 2009 | Formal analysis of attacks for e-voting system. Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita |
| 2009 | Greylisting - long term analysis of anti-SPAM effect. Tomas Sochor |
| 2009 | Honeypot router for routing protocols protection. Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula |
| 2009 | Modeling dependencies in security risk management. Tansu Alpcan, Nicholas Bambos |
| 2009 | Permutation-based steganographic channels. Kevin Forest, Scott Knight |
| 2009 | Re-inforced stealth breakpoints. Amit Vasudevan |
| 2009 | Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco networks. Andrea Bobbio, Ester Ciancamerla, Saverio Di Blasi, Alessandro Iacomini, Federico Mari, Igor Melatti, Michele Minichino, Alessandro Scarlatti, Enrico Tronci, Roberta Terruggia, Emilio Zendri |
| 2009 | Runtime verification of declassification for imperative programs: Formal foundations. Thomas Demongeot, Julien Mallet, Yves Le Traon |
| 2009 | SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data. Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel |
| 2009 | Untrustworthiness: A trust-based security metric. Afonso Araújo Neto, Marco Vieira |