{"title":"STS-Tool: Security Requirements Engineering for Socio-Technical Systems","authors":"E. Paja, F. Dalpiaz, P. Giorgini","doi":"10.1007/978-3-319-07452-8_3","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_3","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125611883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bertolino, Yves Le Traon, F. Lonetti, E. Marchetti, T. Mouelhi
{"title":"Validation of Access Control Systems","authors":"A. Bertolino, Yves Le Traon, F. Lonetti, E. Marchetti, T. Mouelhi","doi":"10.1007/978-3-319-07452-8_9","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_9","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127564589","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. A. D. Dios, Carolina Dania, D. Basin, M. Clavel
{"title":"Model-Driven Development of a Secure eHealth Application","authors":"M. A. D. Dios, Carolina Dania, D. Basin, M. Clavel","doi":"10.1007/978-3-319-07452-8_4","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_4","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125622909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Animesh Pathak, George Rosca, V. Issarny, Maarten Decat, B. Lagaisse
{"title":"Privacy and Access Control in Federated Social Networks","authors":"Animesh Pathak, George Rosca, V. Issarny, Maarten Decat, B. Lagaisse","doi":"10.1007/978-3-319-07452-8_7","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_7","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133472674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evaluation of Engineering Approaches in the Secure Software Development Life Cycle","authors":"Marianne Busch, N. Koch, M. Wirsing","doi":"10.1007/978-3-319-07452-8_10","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_10","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117257848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
José Antonio Martín, F. Martinelli, I. Matteucci, E. Pimentel, Mathieu Turuani
{"title":"On the Synthesis of Secure Services Composition","authors":"José Antonio Martín, F. Martinelli, I. Matteucci, E. Pimentel, Mathieu Turuani","doi":"10.1007/978-3-319-07452-8_6","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_6","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121967713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Modeling Security Features of Web Applications","authors":"Marianne Busch, N. Koch, S. Suppan","doi":"10.1007/978-3-319-07452-8_5","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_5","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"2017 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124709801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atle Refsdal, Øyvind Rideng, Bjørnar Solhaug, K. Stølen
{"title":"Divide and Conquer - Towards a Notion of Risk Model Encapsulation","authors":"Atle Refsdal, Øyvind Rideng, Bjørnar Solhaug, K. Stølen","doi":"10.1007/978-3-319-07452-8_14","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_14","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121637384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Bertolino, Marianne Busch, Said Daoudagh, F. Lonetti, E. Marchetti
{"title":"A Toolchain for Designing and Testing Access Control Policies","authors":"A. Bertolino, Marianne Busch, Said Daoudagh, F. Lonetti, E. Marchetti","doi":"10.1007/978-3-319-07452-8_11","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_11","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129630307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Verification of Authorization Policies Modified by Delegation","authors":"M. Egea, Fabian Büttner","doi":"10.1007/978-3-319-07452-8_12","DOIUrl":"https://doi.org/10.1007/978-3-319-07452-8_12","url":null,"abstract":"","PeriodicalId":240127,"journal":{"name":"Engineering Secure Future Internet Services and Systems","volume":"86 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127439597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}