[CEUR Workshop Proceedings] Vol-833⫷ Vol-834 ⫸Vol-835
urn:nbn:de:0074-834-1

Copyright © 2012 for the individual papers by the papers' authors. Copying permitted only for private and academic purposes. This volume is published and copyrighted by its editors.






ESSoS-DS 2012
Doctoral Symposium of ESSoS 12


Proceedings of the Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS 2012)
Eindhoven, The Netherlands, February 15, 2012 .


Organised by

Network of Excellence on Engineering Secure Future Internet Software Services and Systems


Edited by

Jorge Cuellar *
Nora Koch **

* Siemens AG , Munich, Germany
** Ludwig-Maximilians-Universität München and Cirquent GmbH, Germany



Table of Contents

Proceedings

Preface

  1. Risk-driven Security Testing versus Test-driven Security Risk Analysis 5-10
    Gencer Erdogan, Ketil Stølen
  2. Security of the OSGi Platform 11-16
    Anton Philippov, Olga Gadyatskaya, Fabio Massacci
  3. Security Guarantees and Evolution: From Models to Reality 17-22
    Martín Ochoa
  4. Attack-preserving Security Protocol Transformations 23-28
    Binh Thanh Nguyen, Christoph Sprenger, David Basin
  5. Parametric Attack Graph Construction and Analysis 29-34
    Leanid Krautsevich
  6. Enhancing Safety and Security of Distributed Systems through Formal Patterns 35-40
    Tobias Mühlbauer, Jonas Eckhardt
  7. Service-Oriented Trust and Reputation Architecture 41-46
    Francisco Moyano, Carmen Fernández-Gago, Javier Lopez
  8. Access Control Policy Administration supporting User-defined Privacy Preferences: A Use-case in the Context of Patient-centric Health-care 47-52
    Thomas Trojer, Ruth Breu
  9. Federated Authorization for SaaS applications 43-48
    Maarten Decat, Bert Lagaisse, Wouter Joosen
  10. Modeling Social Networking Privacy 49-54
    Carolina Dania
  11. Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering Approaches 65-70
    Kristian Beckers
  12. The Dark Side of Vulnerability Exploitation: A Proposal for a Research Analysis 71-76
    Luca Allodi

02-Mar-2012: submitted by Nora Koch, Jorge Cuellar
06-Mar-2012 : published on CEUR-WS.org