The SCEAS System
Navigation Menu

Conferences in DBLP

Foundations of Security Analysis and Design (fosad)
2007 (conf/fosad/2007)

  1. Martín Abadi
    Security Protocols: Principles and Calculi. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:1-23 [Conf]
  2. Massimo Bartoletti, Pierpaolo Degano, Gian Luigi Ferrari, Roberto Zunino
    Secure Service Orchestration. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:24-74 [Conf]
  3. Daniel Le Métayer
    IT Security Analysis Best Practices and Formal Approaches. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:75-91 [Conf]
  4. Úlfar Erlingsson
    Low-Level Software Security: Attacks and Defenses. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:92-134 [Conf]
  5. Fabio Martinelli, Paolo Mori
    Enhancing Java Security with History Based Access Control. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:135-159 [Conf]
  6. Javier Lopez, Cristina Alcaraz, Rodrigo Roman
    On the Protection and Technologies of Critical Information Infrastructures. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:160-182 [Conf]
  7. Liqun Chen
    An Interpretation of Identity-Based Cryptography. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:183-208 [Conf]
  8. Audun Jøsang
    Trust and Reputation Systems. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:209-245 [Conf]
  9. Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough
    An Introduction to the Role Based Trust Management Framework RT. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:246-281 [Conf]
  10. Eimear Gallery, Chris J. Mitchell
    Trusted Mobile Platforms. [Citation Graph (0, 0)][DBLP]
    FOSAD, 2007, pp:282-323 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002