Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
Security policy foundations in context UNITY
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
Preserving security properties under refinement
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
A conceptual meta-model for secured information systems
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
Composition of least privilege analysis results in software architectures (position paper)
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
Towards transformation guidelines from secure tropos to misuse cases (position paper)
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
PEASOUP: preventing exploits against software of uncertain provenance (position paper)
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems
Hi-index | 0.00 |
The 7th edition of the SESS workshop aims at providing a venue for software engineers and security researchers to exchange ideas and techniques. In fact, software is at core of most of the business transactions and its smart integration in an industrial setting may be the competitive advantage even when the core competence is outside the ICT field. As a result, the revenues of a firm depend directly on several complex software-based systems. Thus, stakeholders and users should be able to trust these systems to provide data and elaborations with a degree of confidentiality, integrity, and availability compatible with their needs. Moreover, the pervasiveness of software products in the creation of critical infrastructures has raised the value of trustworthiness and new efforts should be dedicated to achieve it. However, nowadays almost every application has some kind of security requirement even if its use is not to be considered critical.