Journal Articles 2011(2 publications) [publication]Araújo Neto, A.C.d. and Marco Vieira , "Selecting Secure Web Applications Using Trustworthiness Benchmarking", International Journal of Dependable and Trustworthy Information Systems , vol. 2, pp. 1-16, 2011 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Security Gaps in Databases: A Comparison of Alternative Software Products for Web Applications Support", International Journal of Secure Software Engineering, vol. 2, pp. 42-62, 2011 2010(1 publication) [publication]Araújo Neto, A.C.d. and Marco Vieira , "Benchmarking Untrustworthiness: An Alternative to Security Measurement", International Journal of Dependable and Trustworthy Information Systems, vol. 1, pp. 32-54, 2010 [citation][year=2013]S. Zonouz, R. Berthier, H. Khurana, W. Sanders, T. Yardley, "Seclius: An Information Flow-based, Consequence-centric Security Metric", IEEE Transactions on Parallel and Distributed Systems, vol.PP, no.99, 2013. [citation][year=2010]Ming Li, B. Alessio, Wanlei Zhou, "OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security", 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China, December 2010. Conference Articles 2013(1 publication) [publication]Raquel Almeida and Araújo Neto, A.C.d. and Marco Vieira , "SCoRe: An Across-the-Board Metric for Computer Systems Resilience Benchmarking", in 1st Workshop on Systems Resilience (WSR 2013), 2013 2011(4 publications) [publication]Araújo Neto, A.C.d. and Marco Vieira , "Trustworthiness Benchmarking of Web Applications Using Static Code Analysis", in Sixth International Conference on Availability, Reliability and Security (ARES), 2011 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Selecting Software Packages for Secure Database Installations", in Sixth International Conference on Availability, Reliability and Security (ARES), 2011 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Towards benchmarking the trustworthiness of web applications code", in 13th European Workshop on Dependable Computing (EWDC 2011), 2011 [publication]Araújo Neto, A.C.d. and Marco Vieira , "TO BEnchmark or NOT TO BEnchmark security: That is the question", in IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops. (HotDep 2011), 2011 [citation][year=2012]1. Jesus Luna Garcia, Hamza Ghani, Tsvetoslava Vateva, Neeraj Suri, "Quantitative Assessment of Cloud Security Level Agreements - A Case Study", 9th nternational Conference on Security and Cryptography, SECRYPT 2012, Rome, Italy, July 2012. [citation][year=2012]Jesus Luna Garcia, Robert Langenberg, Neeraj Suri, "Benchmarking cloud security level agreements using quantitative policy trees", 2012 ACM Workshop on Cloud computing security workshop, CCSW '12, Raleigh, NC, USA, October 19, 2012. 2009(5 publications) [publication]Araújo Neto, A.C.d. and Marco Vieira and Madeira, H. , "An Appraisal to Assess the Security of Database Configurations", in International Conference on Dependability (DEPEND 2009), 2009 [citation][year=2013]Dilip kumar Choubey, Joy Bhattacharjee, Roopali Soni, "“Loss Minimization of Web Databases by Fine Grain Approach", International Journal of Engineering Research and Applications (IJERA), Vol. 3 Issue 1, January-February 2013. [citation][year=2012]Neera Batra, Hemant Aggarwal, "Autonomous Multilevel Policy Based Security tonomous Multilevel Policy Based Security Configuration in Distributed Database", International Journal of Computer Science Issues (IJCSI), Vol. 9 Issue 6 No 2, November 2012. [citation][year=2012]Dilip kumar Choubey, Roopali Soni, Joy Bhattacharjee, "Privacy protection and fine grained access control to web database", IRNetExplore, India, 2012. [citation][year=2011]Jianwu Zhang, Guoai Xu, Yixian Yang, Shize Guo, "A method for system auditing based on baseline assessment", IEEE 3rd International Conference on Communication Software and Networks, ICCSN 2011, Xi'an, China, May 27-29, 2011. [publication]Araújo Neto, A.C.d. and Marco Vieira , "Benchmarking Untrustworthiness in DBMS Configurations", in Fourth Latin-American Symposium on Dependable Computing (LADC 2009), 2009 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Appraisals based on Security Best Practices for Software Configurations", in Fourth Latin-American Symposium on Dependable Computing (LADC 2009), 2009 [publication]Araújo Neto, A.C.d. and Marco Vieira , "A Trust-Based Benchmark for DBMS Configurations", in 15th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC\'09), 2009 [publication]Araújo Neto, A.C.d. and Marco Vieira , "Untrustworthiness: A Trust-Based Security Metric", in 4th International Conference on Risks and Security of Internet and Systems (CRiSIS2009), 2009 [citation][year=2010]1. Ming Li, B. Alessio, Wanlei Zhou, "OST: A Transaction Based Online Social Trust Model for Social Network and File Sharing Security", 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC), Hong Kong, China, December 2010. 2008(2 publications) [publication]Araújo Neto, A.C.d. and Marco Vieira , "Towards Assessing the Security of DBMS Configurations", in IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2008), 2008 [citation][year=2009]1. A. Tjang, F. Oliveira, R. Bianchini, R. P. Martin, T. Nguyen, “Model-Based Validation for Internet Services”, 28th International Symposium on Reliable Distributed Systems (SRDS), October 2009. [publication]Mendes, N. and Araújo Neto, A.C.d. and Joao Duraes and Marco Vieira and Madeira, H. , "Assessing and Comparing Security of Web Servers", in 14th IEEE Pacific Rim International Symposium on Dependable Computing (PRDC\'08), 2008 [citation][year=2013]B. Eshete, A. Villafiorita, K. Weldemariam, M. Zulkernine, “Confeagle: Automated Analysis of Configuration Vulnerabilities in Web Applications”, IEEE 7th International Conference on Software Security and Reliability, SERE 2013, June 18-20, 2013. [citation][year=2012]1. L. Ertaul, Y. Martirosyan, “Implementation of a WEB Application for Evaluation of WEB Application Security Scanners”, 2012 International Conference on Security & Management, SAM’12, Las Vegas, USA, July 2012. [citation][year=2011]1. Birhanu Eshete, Komminist Weldemariam, Adolfo Villafiorita, “Early Detection of Security Misconfiguration Vulnerabilities in Web Applications”, Sixth International Conference on Availability, Reliability and Security, ARES 2011, Vienna, Austria, August 22-26, 2011. [citation][year=2010]1. R. Priyadarshini, S. Aishwarya, A. A. Ahmed, "Search engine vulnerabilities and threats - a survey and proposed solution for a secured censored search platform", International Conference on Communication and Computational Intelligence, INCOCCI 2010, Erode, India, December 27-29, 2010. [citation][year=2009]1. Sérgio Rodrigues Nunes, "Web attack risk awareness with lessons learned from high interaction honeypots", MSc Thesis, University of Lisbon/Carnegie Mellon University, December 2009. [citation][year=2009]2. Yoshio Masuzawa, Takashi Hayakawa, Kazunori Kumakura, Toshio Morikawa, "Method for ensuring security, data storage apparatus, security ensuring server, and storage medium storing program for the same", United States Patent 7574743, August de 2009. Book Chapters 2012(1 publication) [publication]Araújo Neto, A.C.d. and Marco Vieira , "Assessing the Security of Software Configurations", in Threats, Countermeasures, and Advances in Applied Information Security, vol. 1, pp. 129-157, 2012 PhD Theses 2012(1 publication) [publication]Araújo Neto, A.C.d. , "Security Benchmarking of Transactional Systems", 2012