Pub Date : 2015-03-04DOI: 10.1007/978-3-319-15618-7_9
Raoul Strackx, Pieter Philippaerts, F. Vogels
{"title":"Idea: Towards an Inverted Cloud","authors":"Raoul Strackx, Pieter Philippaerts, F. Vogels","doi":"10.1007/978-3-319-15618-7_9","DOIUrl":"https://doi.org/10.1007/978-3-319-15618-7_9","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114364373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-04DOI: 10.1007/978-3-319-15618-7_5
Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon
{"title":"Are Your Training Datasets Yet Relevant? - An Investigation into the Importance of Timeline in Machine Learning-Based Malware Detection","authors":"Kevin Allix, Tegawendé F. Bissyandé, Jacques Klein, Yves Le Traon","doi":"10.1007/978-3-319-15618-7_5","DOIUrl":"https://doi.org/10.1007/978-3-319-15618-7_5","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117050492","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-04DOI: 10.1007/978-3-319-15618-7_16
Lars Hamann, K. Sohr, Martin Gogolla
{"title":"Monitoring Database Access Constraints with an RBAC Metamodel: A Feasibility Study","authors":"Lars Hamann, K. Sohr, Martin Gogolla","doi":"10.1007/978-3-319-15618-7_16","DOIUrl":"https://doi.org/10.1007/978-3-319-15618-7_16","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125279218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-04DOI: 10.1007/978-3-319-15618-7_7
Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, C. Irvine
{"title":"Re-thinking Kernelized MLS Database Architectures in the Context of Cloud-Scale Data Stores","authors":"Thuy D. Nguyen, Mark A. Gondree, Jean Khosalim, C. Irvine","doi":"10.1007/978-3-319-15618-7_7","DOIUrl":"https://doi.org/10.1007/978-3-319-15618-7_7","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"266 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129878570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-04DOI: 10.1007/978-3-319-15618-7_13
Amina Souag, C. Salinesi, R. Mazo, I. Comyn-Wattiau
{"title":"A Security Ontology for Security Requirements Elicitation","authors":"Amina Souag, C. Salinesi, R. Mazo, I. Comyn-Wattiau","doi":"10.1007/978-3-319-15618-7_13","DOIUrl":"https://doi.org/10.1007/978-3-319-15618-7_13","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115488648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-04DOI: 10.1007/978-3-319-15618-7_2
Marouane Fazouane, Henning Kopp, R. V. D. Heijden, D. Métayer, F. Kargl
{"title":"Formal Verification of Privacy Properties in Electric Vehicle Charging","authors":"Marouane Fazouane, Henning Kopp, R. V. D. Heijden, D. Métayer, F. Kargl","doi":"10.1007/978-3-319-15618-7_2","DOIUrl":"https://doi.org/10.1007/978-3-319-15618-7_2","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"256 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-04DOI: 10.1007/978-3-319-15618-7_4
Raoul Strackx, Niels Lambrigts
{"title":"Idea: State-Continuous Transfer of State in Protected-Module Architectures","authors":"Raoul Strackx, Niels Lambrigts","doi":"10.1007/978-3-319-15618-7_4","DOIUrl":"https://doi.org/10.1007/978-3-319-15618-7_4","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130942783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2015-03-04DOI: 10.1007/978-3-319-15618-7_11
Luca Allodi
{"title":"The Heavy Tails of Vulnerability Exploitation","authors":"Luca Allodi","doi":"10.1007/978-3-319-15618-7_11","DOIUrl":"https://doi.org/10.1007/978-3-319-15618-7_11","url":null,"abstract":"","PeriodicalId":273207,"journal":{"name":"Engineering Secure Software and Systems","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126466688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}