2008 |
10 | | Riccardo Scandariato,
Giovanni Russello:
Proceedings of the Workshop on Middleware Security, Leuven, Belgium, December 2, 2008
ACM 2008 |
9 | EE | Thomas Heyman,
Riccardo Scandariato,
Christophe Huygens,
Wouter Joosen:
Using Security Patterns to Combine Security Metrics.
ARES 2008: 1156-1163 |
8 | EE | Koen Yskout,
Riccardo Scandariato,
Bart De Win,
Wouter Joosen:
Transforming Security Requirements into Architecture.
ARES 2008: 1421-1428 |
7 | EE | Kim Wuyts,
Riccardo Scandariato,
Geert Claeys,
Wouter Joosen:
Hardening XDS-Based Architectures.
ARES 2008: 18-25 |
6 | EE | Riccardo Scandariato,
Yoram Ofek,
Paolo Falcarin,
Mario Baldi:
Application-Oriented Trust in Distributed Computing.
ARES 2008: 434-439 |
5 | EE | Eryk Kylikowski,
Riccardo Scandariato,
Wouter Joosen:
Using Multi-Level Security Annotations to Improve Software Assurance.
HASE 2008: 471-474 |
2007 |
4 | EE | Koen Buyens,
Riccardo Scandariato,
Wouter Joosen:
Process Activities Supporting Security Principles.
COMPSAC (2) 2007: 281-292 |
2006 |
3 | EE | Paolo Falcarin,
Riccardo Scandariato,
Mario Baldi:
Remote Trust with Aspect-Oriented Programming.
AINA (1) 2006: 451-458 |
2 | EE | Riccardo Scandariato,
Bart De Win,
Wouter Joosen:
Towards a measuring framework for security properties of software.
QoP 2006: 27-30 |
2004 |
1 | EE | Riccardo Scandariato,
John C. Knight:
The Design and Evaluation of a Defense System for Internet Worms.
SRDS 2004: 164-173 |