


default search action
4th CRiSIS 2009: Toulouse, France
- Anas Abou El Kalam, Yves Deswarte, Mahmoud Mostafa:
CRiSIS 2009, Post-Proceedings of the Fourth International Conference on Risks and Security of Internet and Systems, Toulouse, France, October 19-22, 2009. IEEE 2009, ISBN 978-1-4244-4498-4 - Philippe Balbiani
, Yannick Chevalier
, Marwa El Houri:
A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environment. 3-11 - Stere Preda, Laurent Toutain, Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquín García-Alfaro
:
A secured delegation of remote services on IPv6 home networks. 12-18 - Abdul Ghafoor Abbasi, Sead Muftic, Gernot Schmölzer:
CryptoNET: Secure federation protocol and authorization policies for SMI. 19-25 - Komminist Weldemariam, Richard A. Kemmerer, Adolfo Villafiorita
:
Formal analysis of attacks for e-voting system. 26-34 - Slim Trabelsi, Vincent Salzgeber, Michele Bezzi, Gilles Montagnon:
Data disclosure risk evaluation. 35-72 - Thomas Demongeot, Julien Mallet, Yves Le Traon:
Runtime verification of declassification for imperative programs: Formal foundations. 43-50 - Jonathan-Christofer Demay, Eric Totel, Frédéric Tronel
:
SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data. 51-58 - Amit Vasudevan:
Re-inforced stealth breakpoints. 59-66 - Kevin Forest, Scott Knight:
Permutation-based steganographic channels. 67-73 - Anirban Sengupta
, Chandan Mazumdar, Aditya Bagchi:
A formal methodology for detection of vulnerabilities in an enterprise information system. 74-81 - Stefan Jakoubi, Simon Tjoa
:
A reference model for risk-aware business process management. 82-89 - Andrea Bobbio
, Ester Ciancamerla, Saverio Di Blasi, Alessandro Iacomini, Federico Mari
, Igor Melatti, Michele Minichino, Alessandro Scarlatti, Enrico Tronci
, Roberta Terruggia
, Emilio Zendri:
Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco networks. 90-97 - Tomas Sochor
:
Greylisting - long term analysis of anti-SPAM effect. 98-104 - Komminist Weldemariam, Adolfo Villafiorita
, Andrea Mattioli:
Experiments and data analysis of electronic voting system. 105-112 - Tansu Alpcan
, Nicholas Bambos:
Modeling dependencies in security risk management. 113-116 - Anton Romanov, Eiji Okamoto:
A quantitative approach to assess information security related risks. 117-122 - Afonso Araújo Neto, Marco Vieira
:
Untrustworthiness: A trust-based security metric. 123-126 - Abdallah Ghourabi
, Tarek Abbes, Adel Bouhoula:
Honeypot router for routing protocols protection. 127-130 - Nadia Soudani, Bel G. Raggad, Belhassen Zouari:
A formal design of secure information systems by using a Formal Secure Data Flow Diagram (FSDFD). 131-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.