dblp.uni-trier.dewww.uni-trier.de

Riccardo Scandariato

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
10 Riccardo Scandariato, Giovanni Russello: Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008 ACM 2008
9EEThomas Heyman, Riccardo Scandariato, Christophe Huygens, Wouter Joosen: Using Security Patterns to Combine Security Metrics. ARES 2008: 1156-1163
8EEKoen Yskout, Riccardo Scandariato, Bart De Win, Wouter Joosen: Transforming Security Requirements into Architecture. ARES 2008: 1421-1428
7EEKim Wuyts, Riccardo Scandariato, Geert Claeys, Wouter Joosen: Hardening XDS-Based Architectures. ARES 2008: 18-25
6EERiccardo Scandariato, Yoram Ofek, Paolo Falcarin, Mario Baldi: Application-Oriented Trust in Distributed Computing. ARES 2008: 434-439
5EEEryk Kylikowski, Riccardo Scandariato, Wouter Joosen: Using Multi-Level Security Annotations to Improve Software Assurance. HASE 2008: 471-474
2007
4EEKoen Buyens, Riccardo Scandariato, Wouter Joosen: Process Activities Supporting Security Principles. COMPSAC (2) 2007: 281-292
2006
3EEPaolo Falcarin, Riccardo Scandariato, Mario Baldi: Remote Trust with Aspect-Oriented Programming. AINA (1) 2006: 451-458
2EERiccardo Scandariato, Bart De Win, Wouter Joosen: Towards a measuring framework for security properties of software. QoP 2006: 27-30
2004
1EERiccardo Scandariato, John C. Knight: The Design and Evaluation of a Defense System for Internet Worms. SRDS 2004: 164-173

Coauthor Index

1Mario Baldi [3] [6]
2Koen Buyens [4]
3Geert Claeys [7]
4Paolo Falcarin [3] [6]
5Thomas Heyman [9]
6Christophe Huygens [9]
7Wouter Joosen [2] [4] [5] [7] [8] [9]
8John C. Knight [1]
9Eryk Kylikowski [5]
10Yoram Ofek [6]
11Giovanni Russello [10]
12Bart De Win [2] [8]
13Kim Wuyts [7]
14Koen Yskout [8]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)