The Community for Technology Leaders
Software Engineering for Secure Systems, ICSE Workshop on (2009)
Vancouver, BC
May 19, 2009 to May 19, 2009
ISBN: 978-1-4244-3725-2
TABLE OF CONTENTS
Papers

Author index (PDF)

pp. 1-2

Title page (PDF)

pp. 1

Reusable security use cases for mobile grid environments (Abstract)

D.G. Rosado , Inf. Syst.&Technol. Dept., Univ. of Castilla-La Mancha, Ciudad Real
E. Fernandez-Medina , Inf. Syst.&Technol. Dept., Univ. of Castilla-La Mancha, Ciudad Real
pp. 1-8

Resolving least privilege violations in software architectures (Abstract)

K. Buyens , IBBT-Distrinet
B. De Win , IBBT-Distrinet
W. Joosen , IBBT-Distrinet
pp. 9-16

Intrusion detection using signatures extracted from execution profiles (Abstract)

M. El-Ghali , Dept. of Electr.&Comput. Eng., American Univ. of Beirut, Beirut
W. Masri , Dept. of Electr.&Comput. Eng., American Univ. of Beirut, Beirut
pp. 17-24

A hybrid analysis framework for detecting web application vulnerabilities (Abstract)

M. Monga , Univ. degli Studi di Milano, Milan
R. Paleari , Univ. degli Studi di Milano, Milan
E. Passerini , Univ. degli Studi di Milano, Milan
pp. 25-32

SWAP: Mitigating XSS attacks using a reverse proxy (Abstract)

P. Wurzinger , Secure Syst. Lab., Tech. Univ. Vienna, Vienna
C. Platzer , Secure Syst. Lab., Tech. Univ. Vienna, Vienna
C. Ludl , Secure Syst. Lab., Tech. Univ. Vienna, Vienna
pp. 33-39

Metamodel for privacy policies within SOA (Abstract)

D.S. Allison , Dept. of Electr.&Comput. Eng., Univ. of Western Ontario, London, ON
H.F. El Yamany , Dept. of Electr.&Comput. Eng., Univ. of Western Ontario, London, ON
M. Capretz , Dept. of Electr.&Comput. Eng., Univ. of Western Ontario, London, ON
pp. 40-46

MUTEC: Mutation-based testing of Cross Site Scripting (Abstract)

H. Shahriar , Sch. of Comput., Queen's Univ., Kingston, ON
M. Zulkernine , Sch. of Comput., Queen's Univ., Kingston, ON
pp. 47-53

RUP-based process model for security requirements engineering in value-added service development (Abstract)

H. Belani , Comput. Dept. of Telecommun., Univ. of Zagreb, Zagreb
Z. Car , Comput. Dept. of Telecommun., Univ. of Zagreb, Zagreb
pp. 54-60

Improving perimeter security with security-oriented program transformations (Abstract)

M. Hafiz , Univ. of Illinois at Urbana-Champaign, Urbana, IL
R.E. Johnson , Univ. of Illinois at Urbana-Champaign, Urbana, IL
pp. 61-67

Generating formal specifications for security-critical applications - A model-driven approach (Abstract)

N. Moebius , Dept. of Software Eng.&Programming Languages, Univ. Augsburg, Augsburg
K. Stenzel , Dept. of Software Eng.&Programming Languages, Univ. Augsburg, Augsburg
W. Reif , Dept. of Software Eng.&Programming Languages, Univ. Augsburg, Augsburg
pp. 68-74
75 ms
(Ver 3.3 (11022016))