Pub Date : 2016-12-05DOI: 10.1007/978-3-319-49100-4_9
F. Morgner, Paul Bastian, M. Fischlin
{"title":"Attribute-Based Access Control Architectures with the eIDAS Protocols","authors":"F. Morgner, Paul Bastian, M. Fischlin","doi":"10.1007/978-3-319-49100-4_9","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_9","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116424846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-05DOI: 10.1007/978-3-319-49100-4_8
A. D. L. R. Algarin, S. Demurjian
{"title":"Extending the UML Standards to Model Tree-Structured Data and Their Access Control Requirements","authors":"A. D. L. R. Algarin, S. Demurjian","doi":"10.1007/978-3-319-49100-4_8","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_8","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127441723","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-05DOI: 10.1007/978-3-319-49100-4_4
M. Mehrnezhad, M. Ali, F. Hao, A. Moorsel
{"title":"NFC Payment Spy: A Privacy Attack on Contactless Payments","authors":"M. Mehrnezhad, M. Ali, F. Hao, A. Moorsel","doi":"10.1007/978-3-319-49100-4_4","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_4","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"197 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124397947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-05DOI: 10.1007/978-3-319-49100-4_2
J. Guttman, John D. Ramsdell, Paul D. Rowe
{"title":"Cross-Tool Semantics for Protocol Security Goals","authors":"J. Guttman, John D. Ramsdell, Paul D. Rowe","doi":"10.1007/978-3-319-49100-4_2","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_2","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132131946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-05DOI: 10.1007/978-3-319-49100-4_10
Yoshikazu Hanatani, Naoki Ogura, Y. Ohba, Lidong Chen, S. Das
{"title":"Secure Multicast Group Management and Key Distribution in IEEE 802.21","authors":"Yoshikazu Hanatani, Naoki Ogura, Y. Ohba, Lidong Chen, S. Das","doi":"10.1007/978-3-319-49100-4_10","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_10","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115968112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-05DOI: 10.1007/978-3-319-49100-4_7
K. Paterson, Thyla van der Merwe
{"title":"Reactive and Proactive Standardisation of TLS","authors":"K. Paterson, Thyla van der Merwe","doi":"10.1007/978-3-319-49100-4_7","DOIUrl":"https://doi.org/10.1007/978-3-319-49100-4_7","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121587322","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-12-15DOI: 10.1007/978-3-319-27152-1_5
Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, C. Meadows, J. Meseguer
{"title":"Analysis of the PKCS#11 API Using the Maude-NPA Tool","authors":"Antonio González-Burgueño, Sonia Santiago, Santiago Escobar, C. Meadows, J. Meseguer","doi":"10.1007/978-3-319-27152-1_5","DOIUrl":"https://doi.org/10.1007/978-3-319-27152-1_5","url":null,"abstract":"","PeriodicalId":270366,"journal":{"name":"ACM SIGSOFT Symposium on Software Reusability","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130229146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}