Suivre
Carlos E. Rubio-Medrano
Titre
Citée par
Citée par
Année
Honeyplc: A next-generation honeypot for industrial control systems
E López-Morales, C Rubio-Medrano, A Doupé, Y Shoshitaishvili, R Wang, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
592020
Random test data generation for Java classes annotated with JML specifications
Y Cheon, CE Rubio-Medrano
512007
Understanding and predicting private interactions in underground forums
Z Sun, CE Rubio-Medrano, Z Zhao, T Bao, A Doupé, GJ Ahn
Proceedings of the Ninth ACM Conference on Data and Application Security and …, 2019
212019
Supporting secure collaborations with attribute-based access control
CE Rubio-Medrano, C D'Souza, GJ Ahn
9th IEEE International Conference on Collaborative Computing: Networking …, 2013
202013
Having Your Cake and Eating It: An Analysis of {Concession-Abuse-as-a-Service}
Z Sun, A Oest, P Zhang, C Rubio-Medrano, T Bao, R Wang, Z Zhao, ...
30th USENIX Security Symposium (USENIX Security 21), 4169-4186, 2021
162021
Federated access management for collaborative network environments: Framework and case study
CE Rubio-Medrano, Z Zhao, A Doupé, GJ Ahn
Proceedings of the 20th ACM Symposium on Access Control Models and …, 2015
142015
Mutated policies: towards proactive attribute-based defenses for access control
CE Rubio-Medrano, J Lamp, A Doupé, Z Zhao, GJ Ahn
Proceedings of the 2017 Workshop on Moving Target Defense, 39-49, 2017
122017
“Flawed, but like democracy we don’t have a better system”: The Experts’ Insights on the Peer Review Process of Evaluating Security Papers
A Soneji, FB Kokulu, C Rubio-Medrano, T Bao, R Wang, Y Shoshitaishvili, ...
2022 IEEE Symposium on Security and Privacy (SP), 1845-1862, 2022
82022
Effectively enforcing authorization constraints for emerging space-sensitive technologies
CE Rubio-Medrano, S Jogani, M Leitner, Z Zhao, GJ Ahn
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
82019
Towards effective verification of multi-model access control properties
BJ Berger, C Maeder, R Wete Nguempnang, K Sohr, C Rubio-Medrano
Proceedings of the 24th ACM Symposium on Access Control Models and …, 2019
72019
Verifying access control properties with design by contract: Framework and lessons learned
CE Rubio-Medrano, GJ Ahn, K Sohr
2013 IEEE 37th Annual Computer Software and Applications Conference, 21-26, 2013
62013
DyPolDroid: Protecting against permission-abuse attacks in android
CE Rubio-Medrano, PKD Soundrapandian, M Hill, L Claramunt, J Baek, ...
Information Systems Frontiers 25 (2), 529-548, 2023
52023
OntoEDS: protecting energy delivery systems by collaboratively analyzing security requirements
J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn
2017 IEEE 3rd International Conference on Collaboration and Internet …, 2017
52017
The danger of missing instructions: A systematic analysis of security requirements for mcps
J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn
Proceedings of the 2018 IEEE/ACM International Conference on Connected …, 2018
42018
Exsol: Collaboratively assessing cybersecurity risks for protecting energy delivery systems
J Lamp, CE Rubio-Medrano, Z Zhao, GJ Ahn
2019 7th Workshop on Modeling and Simulation of Cyber-Physical Energy …, 2019
32019
EDSGuard: Enforcing network security requirements for energy delivery systems
V Coughlin, C Rubio-Medrano, Z Zhao, GJ Ahn
2018 IEEE International Conference on Communications, Control, and Computing …, 2018
32018
Achieving security assurance with assertion-based application construction
CE Rubio-Medrano, GJ Ahn, K Sohr
10th IEEE International Conference on Collaborative Computing: Networking …, 2014
32014
A Formal Specification in JML of Java Security Package
P Agarwal, CE Rubio-Medrano, Y Cheon, PJ Teller
Advances and Innovations in Systems, Computing Sciences and Software …, 2007
22007
A formal specification in JML of the Java security package
P Agarwal, CE Rubio-Medrano, Y Cheon, PJ Teller
22006
SpaceMediator: Leveraging Authorization Policies to Prevent Spatial and Privacy Attacks in Mobile Augmented Reality
L Claramunt, C Rubio-Medrano, J Baek, GJ Ahn
Proceedings of the 28th ACM Symposium on Access Control Models and …, 2023
12023
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20