|
Search the dblp DataBase
Frank Piessens:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen
Uniform Application-level Access Control Enforcement of Organizationwide Policies. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:431-440 [Conf]
- Frank Piessens, Eric Steegmans
Selective Attribute Elimination for Categorial Data Specifications. [Citation Graph (0, 0)][DBLP] AMAST, 1997, pp:424-436 [Conf]
- Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
Bridging the gap between web application firewalls and web applications. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:67-77 [Conf]
- Frank Piessens, Eric Steegmans
Canonical Forms for Data-Specifications. [Citation Graph (0, 0)][DBLP] CSL, 1994, pp:397-411 [Conf]
- Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen
Second Price Auctions, A Case Study of Secure Distributed Computating. [Citation Graph (0, 0)][DBLP] DAIS, 2001, pp:217-228 [Conf]
- Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen
Adaptable Access Control Policies for Medical Information Systems. [Citation Graph (0, 0)][DBLP] DAIS, 2003, pp:133-140 [Conf]
- Marc Denecker, Guy Duchatelet, Frank Piessens, Kristof Van Belleghem, Danny De Schreye
Using Event Calculus for Protocol Specification: An Experiment. [Citation Graph (0, 0)][DBLP] Deductive Databases / Abduction in Deductive Databases, 1995, pp:187-201 [Conf]
- Zinovy Diskin, Boris Kadish, Frank Piessens, Michael Johnson
Universal Arrow Foundations for Visual Modeling. [Citation Graph (0, 0)][DBLP] Diagrams, 2000, pp:345-360 [Conf]
- Bart Jacobs 0002, Jan Smans, Frank Piessens, Wolfram Schulte
A Statically Verifiable Programming Model for Concurrent Object-Oriented Programs. [Citation Graph (0, 0)][DBLP] ICFEM, 2006, pp:420-439 [Conf]
- Yves Younan, Wouter Joosen, Frank Piessens
Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. [Citation Graph (0, 0)][DBLP] ICICS, 2006, pp:379-398 [Conf]
- Marc Denecker, Kristof Van Belleghem, Guy Duchatelet, Frank Piessens, Danny De Schreye
A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification. [Citation Graph (0, 0)][DBLP] JICSLP, 1996, pp:170-184 [Conf]
- Yves Younan, Wouter Joosen, Frank Piessens
A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. [Citation Graph (0, 0)][DBLP] IWIA, 2005, pp:3-20 [Conf]
- Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven
Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. [Citation Graph (0, 0)][DBLP] MATA, 2000, pp:219-232 [Conf]
- Bart De Decker, Gregory Neven, Frank Piessens
Secure Vickrey Auctions without a Trusted Third Party. [Citation Graph (0, 0)][DBLP] SEC, 2003, pp:337-348 [Conf]
- T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker
On Securely Scheduling a Meeting. [Citation Graph (0, 0)][DBLP] SEC, 2001, pp:183-198 [Conf]
- Gregory Neven, Frank Piessens, Bart De Decker
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. [Citation Graph (0, 0)][DBLP] SEC, 2000, pp:361-370 [Conf]
- Bart Jacobs 0002, Frank Piessens, K. Rustan M. Leino, Wolfram Schulte
Safe Concurrency for Aggregate Objects with Invariants. [Citation Graph (0, 0)][DBLP] SEFM, 2005, pp:137-147 [Conf]
- Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. [Citation Graph (0, 0)][DBLP] Software Composition, 2006, pp:34-49 [Conf]
- Frank Piessens, Bart De Decker, Bart De Win
Developing secure software. A survey and classification of common software vulnerabilities. [Citation Graph (0, 0)][DBLP] IICIS, 2001, pp:27-40 [Conf]
- Lieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten
Towards preserving correctness in self-managed software systems. [Citation Graph (0, 0)][DBLP] WOSS, 2004, pp:34-38 [Conf]
- G. Denys, Frank Piessens, Frank Matthijs
A survey of customizability in operating systems research. [Citation Graph (0, 0)][DBLP] ACM Comput. Surv., 2002, v:34, n:4, pp:450-468 [Journal]
- Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen
A Modular Access Control Service for Supporting Application-Specific Policies. [Citation Graph (0, 0)][DBLP] IEEE Distributed Systems Online, 2006, v:7, n:6, pp:- [Journal]
- Frank Piessens, Bart Jacobs 0002, Wouter Joosen
Software security: experiments on the .NET common language run-time and the shared source common language infrastructure. [Citation Graph (0, 0)][DBLP] IEE Proceedings - Software, 2003, v:150, n:5, pp:303-307 [Journal]
- Frank Piessens, Bart Jacobs 0002, Eddy Truyen, Wouter Joosen
Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2004, v:3, n:2, pp:27-35 [Journal]
- Jan Smans, Bart Jacobs 0002, Frank Piessens
Static Verification of Code Access Security Policy Compliance of .NET Applications. [Citation Graph (0, 0)][DBLP] Journal of Object Technology, 2006, v:5, n:3, pp:35-58 [Journal]
- Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen
Extended Protection against Stack Smashing Attacks without Performance Loss. [Citation Graph (0, 0)][DBLP] ACSAC, 2006, pp:429-438 [Conf]
- Bart Jacobs 0002, Jan Smans, Frank Piessens, Wolfram Schulte
A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs. [Citation Graph (0, 0)][DBLP] Electr. Notes Theor. Comput. Sci., 2007, v:174, n:9, pp:23-47 [Journal]
Protecting Global and Static Variables from Buffer Overflow Attacks. [Citation Graph (, )][DBLP]
A flexible security architecture to support third-party applications on mobile devices. [Citation Graph (, )][DBLP]
Filter-resistant code injection on ARM. [Citation Graph (, )][DBLP]
PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP]
Failboxes: Provably Safe Exception Handling. [Citation Graph (, )][DBLP]
Implicit Dynamic Frames: Combining Dynamic Frames and Separation Logic. [Citation Graph (, )][DBLP]
Security Monitor Inlining for Multithreaded Java. [Citation Graph (, )][DBLP]
An Automatic Verifier for Java-Like Programs Based on Dynamic Frames. [Citation Graph (, )][DBLP]
A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language. [Citation Graph (, )][DBLP]
VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language. [Citation Graph (, )][DBLP]
Heap-Dependent Expressions in Separation Logic. [Citation Graph (, )][DBLP]
An object-oriented approach to datatype-generic programming. [Citation Graph (, )][DBLP]
Generics of a higher kind. [Citation Graph (, )][DBLP]
A machine-checked soundness proof for an efficient verification condition generator. [Citation Graph (, )][DBLP]
Sound reasoning about unchecked exceptions. [Citation Graph (, )][DBLP]
A Machine Checked Soundness Proof for an Intermediate Verification Language. [Citation Graph (, )][DBLP]
Noninterference through Secure Multi-execution. [Citation Graph (, )][DBLP]
Test Input Generation for Programs with Pointers. [Citation Graph (, )][DBLP]
Efficient and Effective Buffer Overflow Protection on ARM Processors. [Citation Graph (, )][DBLP]
Security-By-Contract for the Future Internet. [Citation Graph (, )][DBLP]
Report: Extensibility and Implementation Independence of the .NET Cryptographic API. [Citation Graph (, )][DBLP]
CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. [Citation Graph (, )][DBLP]
Breaking the memory secrecy assumption. [Citation Graph (, )][DBLP]
Preface. [Citation Graph (, )][DBLP]
The S3MS.NET Run Time Monitor: Tool Demonstration. [Citation Graph (, )][DBLP]
Search in 0.009secs, Finished in 0.011secs
|