Abstract is missing.
- A Structured Comparison of Security StandardsKristian Beckers, Isabelle Côté, Stefan Fenz, Denis Hatebur, Maritta Heisel. 1-34 [doi]
- Empirical Assessment of Security Requirements and Architecture: Lessons LearnedRiccardo Scandariato, Federica Paci, Le Minh Sang Tran, Katsiaryna Labunets, Koen Yskout, Fabio Massacci, Wouter Joosen. 35-64 [doi]
- STS-Tool: Security Requirements Engineering for Socio-Technical SystemsElda Paja, Fabiano Dalpiaz, Paolo Giorgini. 65-96 [doi]
- Model-Driven Development of a Secure eHealth ApplicationMiguel Angel García de Dios, Carolina Dania, David A. Basin, Manuel Clavel. 97-118 [doi]
- Modeling Security Features of Web ApplicationsMarianne Busch, Nora Koch, Santiago Suppan. 119-139 [doi]
- On the Synthesis of Secure Services CompositionJosé Antonio Martín, Fabio Martinelli, Ilaria Matteucci, Ernesto Pimentel, Mathieu Turuani. 140-159 [doi]
- Privacy and Access Control in Federated Social NetworksAnimesh Pathak, George Rosca, Valérie Issarny, Maarten Decat, Bert Lagaisse. 160-179 [doi]
- Engineering Trust-Awareness and Self-adaptability in Services and SystemsFrancisco Moyano, M. Carmen Fernández Gago, Benoit Baudry, Javier Lopez. 180-209 [doi]
- Validation of Access Control SystemsAntonia Bertolino, Yves Le Traon, Francesca Lonetti, Eda Marchetti, Tejeddine Mouelhi. 210-233 [doi]
- Evaluation of Engineering Approaches in the Secure Software Development Life CycleMarianne Busch, Nora Koch, Martin Wirsing. 234-265 [doi]
- A Toolchain for Designing and Testing Access Control PoliciesAntonia Bertolino, Marianne Busch, Said Daoudagh, Francesca Lonetti, Eda Marchetti. 266-286 [doi]
- Verification of Authorization Policies Modified by DelegationMarina Egea, Fabian Büttner. 287-314 [doi]
- ISMS-CORAS: A Structured Method for Establishing an ISO 27001 Compliant Information Security Management SystemKristian Beckers, Maritta Heisel, Bjørnar Solhaug, Ketil Stølen. 315-344 [doi]
- Divide and Conquer - Towards a Notion of Risk Model EncapsulationAtle Refsdal, Øyvind Rideng, Bjørnar Solhaug, Ketil Stølen. 345-365 [doi]
- Preserving Data Privacy in e-HealthRiccardo Conti, Alessio Lunardelli, Ilaria Matteucci, Paolo Mori, Marinella Petrocchi. 366-392 [doi]