[CEUR Workshop Proceedings] Vol-834
urn:nbn:de:0074-834-1

Copyright © 2012 for the individual papers by the papers' authors. Copying permitted only for private and academic purposes. This volume is published and copyrighted by its editors.





ESSoS-DS 2012
Doctoral Symposium of ESSoS 12


Proceedings of the Doctoral Symposium of the International Symposium on Engineering Secure Software and Systems (ESSoS 2012)
Eindhoven, The Netherlands, February 15, 2012.


Organised by

Network of Excellence on Engineering Secure Future Internet Software Services and Systems


Edited by

Jorge Cuellar *
Nora Koch **

* Siemens AG, Munich, Germany
** Ludwig-Maximilians-Universität München and Cirquent GmbH, Germany



Table of Contents

Proceedings

Preface

  1. Risk-driven Security Testing versus Test-driven Security Risk Analysis 5-10
    Gencer Erdogan, Ketil Stølen
  2. Security of the OSGi Platform 11-16
    Anton Philippov, Olga Gadyatskaya, Fabio Massacci
  3. Security Guarantees and Evolution: From Models to Reality 17-22
    Martín Ochoa
  4. Attack-preserving Security Protocol Transformations 23-28
    Binh Thanh Nguyen, Christoph Sprenger, David Basin
  5. Parametric Attack Graph Construction and Analysis 29-34
    Leanid Krautsevich
  6. Enhancing Safety and Security of Distributed Systems through Formal Patterns 35-40
    Tobias Mühlbauer, Jonas Eckhardt
  7. Service-Oriented Trust and Reputation Architecture 41-46
    Francisco Moyano, Carmen Fernández-Gago, Javier Lopez
  8. Access Control Policy Administration supporting User-defined Privacy Preferences: A Use-case in the Context of Patient-centric Health-care 47-52
    Thomas Trojer, Ruth Breu
  9. Federated Authorization for SaaS applications 43-48
    Maarten Decat, Bert Lagaisse, Wouter Joosen
  10. Modeling Social Networking Privacy 49-54
    Carolina Dania
  11. Supporting the Development and Documentation of Trustworthy ICT Systems according to Security Standard through Patterns and Security Requirements Engineering Approaches 65-70
    Kristian Beckers
  12. The Dark Side of Vulnerability Exploitation: A Proposal for a Research Analysis 71-76
    Luca Allodi

02-Mar-2012: submitted by Nora Koch, Jorge Cuellar
06-Mar-2012: published on CEUR-WS.org