The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Frank Piessens: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Tine Verhanneman, Frank Piessens, Bart De Win, Wouter Joosen
    Uniform Application-level Access Control Enforcement of Organizationwide Policies. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:431-440 [Conf]
  2. Frank Piessens, Eric Steegmans
    Selective Attribute Elimination for Categorial Data Specifications. [Citation Graph (0, 0)][DBLP]
    AMAST, 1997, pp:424-436 [Conf]
  3. Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
    Bridging the gap between web application firewalls and web applications. [Citation Graph (0, 0)][DBLP]
    FMSE, 2006, pp:67-77 [Conf]
  4. Frank Piessens, Eric Steegmans
    Canonical Forms for Data-Specifications. [Citation Graph (0, 0)][DBLP]
    CSL, 1994, pp:397-411 [Conf]
  5. Bart De Decker, Gregory Neven, Frank Piessens, Erik Van Hoeymissen
    Second Price Auctions, A Case Study of Secure Distributed Computating. [Citation Graph (0, 0)][DBLP]
    DAIS, 2001, pp:217-228 [Conf]
  6. Tine Verhanneman, Liesbeth Jaco, Bart De Win, Frank Piessens, Wouter Joosen
    Adaptable Access Control Policies for Medical Information Systems. [Citation Graph (0, 0)][DBLP]
    DAIS, 2003, pp:133-140 [Conf]
  7. Marc Denecker, Guy Duchatelet, Frank Piessens, Kristof Van Belleghem, Danny De Schreye
    Using Event Calculus for Protocol Specification: An Experiment. [Citation Graph (0, 0)][DBLP]
    Deductive Databases / Abduction in Deductive Databases, 1995, pp:187-201 [Conf]
  8. Zinovy Diskin, Boris Kadish, Frank Piessens, Michael Johnson
    Universal Arrow Foundations for Visual Modeling. [Citation Graph (0, 0)][DBLP]
    Diagrams, 2000, pp:345-360 [Conf]
  9. Bart Jacobs 0002, Jan Smans, Frank Piessens, Wolfram Schulte
    A Statically Verifiable Programming Model for Concurrent Object-Oriented Programs. [Citation Graph (0, 0)][DBLP]
    ICFEM, 2006, pp:420-439 [Conf]
  10. Yves Younan, Wouter Joosen, Frank Piessens
    Efficient Protection Against Heap-Based Buffer Overflows Without Resorting to Magic. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:379-398 [Conf]
  11. Marc Denecker, Kristof Van Belleghem, Guy Duchatelet, Frank Piessens, Danny De Schreye
    A Realistic Experiment in Knowledge Representation in Open Event Calculus: Protocol Specification. [Citation Graph (0, 0)][DBLP]
    JICSLP, 1996, pp:170-184 [Conf]
  12. Yves Younan, Wouter Joosen, Frank Piessens
    A Methodology for Designing Countermeasures against Current and Future Code Injection Attacks. [Citation Graph (0, 0)][DBLP]
    IWIA, 2005, pp:3-20 [Conf]
  13. Bart De Decker, Frank Piessens, Erik Van Hoeymissen, Gregory Neven
    Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations. [Citation Graph (0, 0)][DBLP]
    MATA, 2000, pp:219-232 [Conf]
  14. Bart De Decker, Gregory Neven, Frank Piessens
    Secure Vickrey Auctions without a Trusted Third Party. [Citation Graph (0, 0)][DBLP]
    SEC, 2003, pp:337-348 [Conf]
  15. T. Herlea, Joris Claessens, Bart Preneel, Gregory Neven, Frank Piessens, Bart De Decker
    On Securely Scheduling a Meeting. [Citation Graph (0, 0)][DBLP]
    SEC, 2001, pp:183-198 [Conf]
  16. Gregory Neven, Frank Piessens, Bart De Decker
    On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:361-370 [Conf]
  17. Bart Jacobs 0002, Frank Piessens, K. Rustan M. Leino, Wolfram Schulte
    Safe Concurrency for Aggregate Objects with Invariants. [Citation Graph (0, 0)][DBLP]
    SEFM, 2005, pp:137-147 [Conf]
  18. Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
    Static Verification of Indirect Data Sharing in Loosely-coupled Component Systems. [Citation Graph (0, 0)][DBLP]
    Software Composition, 2006, pp:34-49 [Conf]
  19. Frank Piessens, Bart De Decker, Bart De Win
    Developing secure software. A survey and classification of common software vulnerabilities. [Citation Graph (0, 0)][DBLP]
    IICIS, 2001, pp:27-40 [Conf]
  20. Lieven Desmet, Nico Janssens, Sam Michiels, Frank Piessens, Wouter Joosen, Pierre Verbaeten
    Towards preserving correctness in self-managed software systems. [Citation Graph (0, 0)][DBLP]
    WOSS, 2004, pp:34-38 [Conf]
  21. G. Denys, Frank Piessens, Frank Matthijs
    A survey of customizability in operating systems research. [Citation Graph (0, 0)][DBLP]
    ACM Comput. Surv., 2002, v:34, n:4, pp:450-468 [Journal]
  22. Tine Verhanneman, Frank Piessens, Bart De Win, Eddy Truyen, Wouter Joosen
    A Modular Access Control Service for Supporting Application-Specific Policies. [Citation Graph (0, 0)][DBLP]
    IEEE Distributed Systems Online, 2006, v:7, n:6, pp:- [Journal]
  23. Frank Piessens, Bart Jacobs 0002, Wouter Joosen
    Software security: experiments on the .NET common language run-time and the shared source common language infrastructure. [Citation Graph (0, 0)][DBLP]
    IEE Proceedings - Software, 2003, v:150, n:5, pp:303-307 [Journal]
  24. Frank Piessens, Bart Jacobs 0002, Eddy Truyen, Wouter Joosen
    Support for Metadata-driven Selection of Run-time Services in .NET is Promising but Immature. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2004, v:3, n:2, pp:27-35 [Journal]
  25. Jan Smans, Bart Jacobs 0002, Frank Piessens
    Static Verification of Code Access Security Policy Compliance of .NET Applications. [Citation Graph (0, 0)][DBLP]
    Journal of Object Technology, 2006, v:5, n:3, pp:35-58 [Journal]
  26. Yves Younan, Davide Pozza, Frank Piessens, Wouter Joosen
    Extended Protection against Stack Smashing Attacks without Performance Loss. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2006, pp:429-438 [Conf]
  27. Bart Jacobs 0002, Jan Smans, Frank Piessens, Wolfram Schulte
    A Simple Sequential Reasoning Approach for Sound Modular Verification of Mainstream Multithreaded Programs. [Citation Graph (0, 0)][DBLP]
    Electr. Notes Theor. Comput. Sci., 2007, v:174, n:9, pp:23-47 [Journal]

  28. Protecting Global and Static Variables from Buffer Overflow Attacks. [Citation Graph (, )][DBLP]


  29. A flexible security architecture to support third-party applications on mobile devices. [Citation Graph (, )][DBLP]


  30. Filter-resistant code injection on ARM. [Citation Graph (, )][DBLP]


  31. PAriCheck: an efficient pointer arithmetic checker for C programs. [Citation Graph (, )][DBLP]


  32. Failboxes: Provably Safe Exception Handling. [Citation Graph (, )][DBLP]


  33. Implicit Dynamic Frames: Combining Dynamic Frames and Separation Logic. [Citation Graph (, )][DBLP]


  34. Security Monitor Inlining for Multithreaded Java. [Citation Graph (, )][DBLP]


  35. An Automatic Verifier for Java-Like Programs Based on Dynamic Frames. [Citation Graph (, )][DBLP]


  36. A Caller-Side Inline Reference Monitor for an Object-Oriented Intermediate Language. [Citation Graph (, )][DBLP]


  37. VeriCool: An Automatic Verifier for a Concurrent Object-Oriented Language. [Citation Graph (, )][DBLP]


  38. Heap-Dependent Expressions in Separation Logic. [Citation Graph (, )][DBLP]


  39. An object-oriented approach to datatype-generic programming. [Citation Graph (, )][DBLP]


  40. Generics of a higher kind. [Citation Graph (, )][DBLP]


  41. A machine-checked soundness proof for an efficient verification condition generator. [Citation Graph (, )][DBLP]


  42. Sound reasoning about unchecked exceptions. [Citation Graph (, )][DBLP]


  43. A Machine Checked Soundness Proof for an Intermediate Verification Language. [Citation Graph (, )][DBLP]


  44. Noninterference through Secure Multi-execution. [Citation Graph (, )][DBLP]


  45. Test Input Generation for Programs with Pointers. [Citation Graph (, )][DBLP]


  46. Efficient and Effective Buffer Overflow Protection on ARM Processors. [Citation Graph (, )][DBLP]


  47. Security-By-Contract for the Future Internet. [Citation Graph (, )][DBLP]


  48. Report: Extensibility and Implementation Independence of the .NET Cryptographic API. [Citation Graph (, )][DBLP]


  49. CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests. [Citation Graph (, )][DBLP]


  50. Breaking the memory secrecy assumption. [Citation Graph (, )][DBLP]


  51. Preface. [Citation Graph (, )][DBLP]


  52. The S3MS.NET Run Time Monitor: Tool Demonstration. [Citation Graph (, )][DBLP]


Search in 0.007secs, Finished in 0.284secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002