Folgen
Carlos E. Rubio-Medrano
Titel
Zitiert von
Zitiert von
Jahr
Honeyplc: A next-generation honeypot for industrial control systems
E López-Morales, C Rubio-Medrano, A Doupé, Y Shoshitaishvili, R Wang, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
692020
Random test data generation for Java classes annotated with JML specifications
Y Cheon, CE Rubio-Medrano
512007
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
222019
Supporting secure collaborations with attribute-based access control
CE Rubio-Medrano, C D'Souza, GJ Ahn
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
202013
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021
172021
Federated access management for collaborative network environments: Framework and case study
CE Rubio-Medrano, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
142015
Mutated policies: towards proactive attribute-based defenses for access control
CE Rubio-Medrano, J Lamp, A Doupé, Z Zhao, GJ Ahn
Proceedings of the 2017 Workshop on Moving Target Defense, 39-49, 2017
132017
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers
A Soneji, FB Kokulu, C Rubio-Medrano, T Bao, R Wang, Y Shoshitaishvili, ...
2022 IEEE Symposium on Security and Privacy (SP), 1845-1862, 2022
122022
DyPolDroid: Protecting against permission-abuse attacks in android
CE Rubio-Medrano, PKD Soundrapandian, M Hill, L Claramunt, J Baek, ...
Information Systems Frontiers 25 (2), 529-548, 2023
82023
Effectively enforcing authorization constraints for emerging space-sensitive technologies
CE Rubio-Medrano, S Jogani, M Leitner, Z Zhao, GJ Ahn
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
82019
Towards effective verification of multi-model access control properties
BJ Berger, C Maeder, R Wete Nguempnang, K Sohr, C Rubio-Medrano
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
72019
Verifying access control properties with design by contract: Framework and lessons learned
CE Rubio-Medrano, GJ Ahn, K Sohr
2013 IEEE 37th Annual Computer Software and Applications Conference, 21-26, 2013
62013
OntoEDS: protecting energy delivery systems by collaboratively analyzing security requirements
J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn
2017 IEEE 3rd International Conference on Collaboration and Internet …, 2017
52017
Exsol: Collaboratively assessing cybersecurity risks for protecting energy delivery systems
J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn
2019 7th Workshop on Modeling and Simulation of Cyber-Physical Energy …, 2019
42019
The danger of missing instructions: A systematic analysis of security requirements for mcps
J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn
Proceedings of the 2018 IEEE/ACM International Conference on Connected …, 2018
42018
EDSGuard: Enforcing network security requirements for energy delivery systems
V Coughlin, C Rubio-Medrano, Z Zhao, GJ Ahn
2018 IEEE International Conference on Communications, Control, and Computing …, 2018
32018
Achieving security assurance with assertion-based application construction
CE Rubio-Medrano, GJ Ahn, K Sohr
10th IEEE International Conference on Collaborative Computing: Networking …, 2014
32014
Proactive risk assessment for preventing attribute-forgery attacks to ABAC policies
CE Rubio-Medrano, L Claramunt, S Jogani, GJ Ahn
Proceedings of the 25th ACM Symposium on Access Control Models and …, 2020
22020
A Formal Specification in JML of Java Security Package
P Agarwal, CE Rubio-Medrano, Y Cheon, PJ Teller
Advances and Innovations in Systems, Computing Sciences and Software …, 2007
22007
A formal specification in JML of the Java security package
P Agarwal, CE Rubio-Medrano, Y Cheon, PJ Teller
22006
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20