Author of the publication

Computing counter-examples for privilege protection losses using security models.

, and . SANER, page 240-249. IEEE Computer Society, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taint analysis of manual service compositions using Cross-Application Call Graphs., , and . SANER, page 585-589. IEEE Computer Society, (2015)Classification and Distribution of RBAC Privilege Protection Changes in Wordpress Evolution (Short Paper)., and . PST, page 349-354. IEEE Computer Society, (2017)Soot class loading in the rootbeer GPU compiler., , , , and . SOAP@PLDI, page 19-24. ACM, (2013)A High-Level Aspect-Oriented based Language for Software Security Hardening., , and . SECRYPT, page 363-370. INSTICC Press, (2007)Towards an Aspect Oriented Approach for the Security Hardening of Code., , and . AINA Workshops (1), page 595-600. IEEE Computer Society, (2007)Control Flow Based Pointcuts for Security Hardening Concerns., , , and . IFIPTM, volume 238 of IFIP, page 301-316. Springer, (2007)Security Design Patterns: Survey and Evaluation., , , and . CCECE, page 1605-1608. IEEE, (2006)A Security Hardening Language Based on Aspect-Orientation., , and . ICETE (Selected Papers), volume 23 of Communications in Computer and Information Science, page 254-266. Springer, (2007)Nouveaux points de coupure et primitives pour les préoccupations de renforcement de sécurité., , , and . Technique et Science Informatiques, 28 (5): 611-644 (2009)Security hardening of open source software., , and . PST, volume 380 of ACM International Conference Proceeding Series, page 43. ACM, (2006)