The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG 1.7 Publications (ifip1-7)
2006 (conf/ifip1-7/2006)

  1. Stefano Bistarelli, Marco Dall'Aglio, Pamela Peretti
    Strategic Games on Defense Trees. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:1-15 [Conf]
  2. Johannes Borgström, Olga Grinchtein, Simon Kramer
    Timed Calculus of Cryptographic Communication. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:16-30 [Conf]
  3. Gyrd Brændeland, Ketil Stølen
    A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:31-46 [Conf]
  4. M. Daubignard, Romain Janvier, Yassine Lakhnech, Laurent Mazaré
    Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:47-64 [Conf]
  5. Yuxin Deng, Jun Pang, Peng Wu
    Measuring Anonymity with Relative Entropy. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:65-79 [Conf]
  6. Paul Hankes Drielsma, Sebastian Mödersheim, Luca Viganò, David A. Basin
    Formalizing and Analyzing Sender Invariance. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:80-95 [Conf]
  7. Karl Krukow, Mogens Nielsen
    From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:96-111 [Conf]
  8. Ilaria Matteucci
    A Tool for the Synthesis of Controller Programs. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:112-126 [Conf]
  9. Christian W. Probst, René Rydhof Hansen, Flemming Nielson
    Where Can an Insider Attack? [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:127-142 [Conf]
  10. Fredrik Seehusen, Ketil Stølen
    Maintaining Information Flow Security Under Refinement and Transformation. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:143-157 [Conf]
  11. Ludwig Seitz, Erik Rissanen, Babak Sadighi Firozabadi
    A Classification of Delegation Schemes for Attribute Authority. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:158-169 [Conf]
  12. Dan Søndergaard, Christian W. Probst, Christian Damsgaard Jensen, René Rydhof Hansen
    Program Partitioning Using Dynamic Trust Models. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:170-184 [Conf]
  13. Terkel K. Tolstrup, Flemming Nielson, René Rydhof Hansen
    Locality-Based Security Policies. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:185-201 [Conf]
  14. Kun Wei, James Heather
    A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:202-219 [Conf]
  15. Santiago Zanella Béguelin, Gustavo Betarte, Carlos Luna
    A Formal Specification of the MIDP 2.0 Security Model. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:220-234 [Conf]
  16. Ron van der Meyden, Chenyi Zhang
    A Comparison of Semantic Models for Noninterference. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:235-249 [Conf]
  17. Danièle Beauquier, Ruggero Lanotte
    Hiding Information in Multi Level Security Systems. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:250-269 [Conf]
  18. Chunqi Tian, Shihong Zou, Wendong Wang, Shiduan Cheng
    A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2006, pp:270-284 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002