Discovering concrete attacks on website authorization by formal analysis

C Bansal, K Bhargavan… - Journal of Computer …, 2014 - content.iospress.com
Social sign-on and social sharing are becoming an ever more popular feature of web
applications. This success is largely due to the APIs and support offered by prominent social …

Sok: Science, security and the elusive goal of security as a scientific pursuit

C Herley, PC Van Oorschot - 2017 IEEE symposium on security …, 2017 - ieeexplore.ieee.org
The past ten years has seen increasing calls to make security research more “scientific”. On
the surface, most agree that this is desirable, given universal recognition of “science” as a …

[图书][B] Computer Security and the Internet

PC van Oorschot - 2020 - Springer
Information Security–protecting information in potentially hostile environments–is a crucial
factor in the growth of information-based processes in industry, business, and …

[PDF][PDF] Report on the NSF workshop on formal methods for security

S Chong, J Guttman, A Datta, A Myers, B Pierce… - arXiv preprint arXiv …, 2016 - arxiv.org
Formal Methods for Security Page 1 Report on the NSF Workshop on Formal Methods for
Security Stephen Chong Harvard University Joshua Guttman Worcester Polytechnic Institute …

Test-based security certification of composite services

M Anisetti, C Ardagna, E Damiani… - ACM Transactions on the …, 2018 - dl.acm.org
The diffusion of service-based and cloud-based systems has created a scenario where
software is often made available as services, offered as commodities over corporate …

The hadoop security in big data: a technological viewpoint and analysis

Y Perwej - International Journal of Scientific Research in …, 2019 - hal.science
At present, the world is going to become more digital. As every person using the internet
today, a huge amount of data gets generated day-today. The data are very essential with …

Compositional cyber-physical systems theory

G Bakirtzis - arXiv preprint arXiv:2109.04858, 2021 - arxiv.org
This dissertation builds a compositional cyber-physical systems theory to develop concrete
semantics relating the above diverse views necessary for safety and security assurance. In …

Towards a holistic privacy engineering approach for smart grid systems

HS Fhom, KM Bayarou - … on Trust, Security and Privacy in …, 2011 - ieeexplore.ieee.org
Protecting energy consumers's data and privacy is a key factor for the further adoption and
diffusion of smart grid technologies and applications. However, current smart grid initiatives …

A dummy-based approach for preserving source rate privacy

A Diyanat, A Khonsari… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Recent studies reveal that an adversary might trace the apparently insignificant traffic rate of
source nodes over the net and turn such data to invaluable information so as to breach the …

Certified machine-learning models

E Damiani, CA Ardagna - International Conference on Current Trends in …, 2020 - Springer
The massive adoption of Machine Learning (ML) has deeply changed the internal structure,
the design and the operation of software systems. ML has shifted the focus from code to …