Security Models - Security Models -

Security Models

SEPD: An Access Control Model for Resource Sharing in an IoT Environment
Henrique G. G. Pereira and Philip W. L. Fong

Nighthawk: Transparent System Introspection from Ring -3
Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang and Guojun Wang

Proactivizer: Transforming Existing Verification Tools into Efficient Solutions for Runtime Security Enforcement
Suryadipta Majumdar, Azadeh Tabiban, Meisam Mohammady, Alaa Oqaily, Yosr Jarraya, Makan Pourzandi, Lingyu Wang and Mourad Debbabi

Enhancing Security and Dependability of Industrial Networks with Opinion Dynamics
Juan E. Rubio, Mark Manulis, Cristina Alcaraz and Javier Lopez


Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu

Questions?

✆ Contact the organizing committee: esorics2019 [at] uni [dot] lu