Conferences in DBLP
Stefano Bistarelli , Marco Dall'Aglio , Pamela Peretti Strategic Games on Defense Trees. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:1-15 [Conf ] Johannes Borgström , Olga Grinchtein , Simon Kramer Timed Calculus of Cryptographic Communication. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:16-30 [Conf ] Gyrd Brændeland , Ketil Stølen A Semantic Paradigm for Component-Based Specification Integrating a Notion of Security Risk. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:31-46 [Conf ] M. Daubignard , Romain Janvier , Yassine Lakhnech , Laurent Mazaré Game-Based Criterion Partition Applied to Computational Soundness of Adaptive Security. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:47-64 [Conf ] Yuxin Deng , Jun Pang , Peng Wu Measuring Anonymity with Relative Entropy. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:65-79 [Conf ] Paul Hankes Drielsma , Sebastian Mödersheim , Luca Viganò , David A. Basin Formalizing and Analyzing Sender Invariance. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:80-95 [Conf ] Karl Krukow , Mogens Nielsen From Simulations to Theorems: A Position Paper on Research in the Field of Computational Trust. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:96-111 [Conf ] Ilaria Matteucci A Tool for the Synthesis of Controller Programs. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:112-126 [Conf ] Christian W. Probst , René Rydhof Hansen , Flemming Nielson Where Can an Insider Attack? [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:127-142 [Conf ] Fredrik Seehusen , Ketil Stølen Maintaining Information Flow Security Under Refinement and Transformation. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:143-157 [Conf ] Ludwig Seitz , Erik Rissanen , Babak Sadighi Firozabadi A Classification of Delegation Schemes for Attribute Authority. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:158-169 [Conf ] Dan Søndergaard , Christian W. Probst , Christian Damsgaard Jensen , René Rydhof Hansen Program Partitioning Using Dynamic Trust Models. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:170-184 [Conf ] Terkel K. Tolstrup , Flemming Nielson , René Rydhof Hansen Locality-Based Security Policies. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:185-201 [Conf ] Kun Wei , James Heather A Theorem-Proving Approach to Verification of Fair Non-repudiation Protocols. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:202-219 [Conf ] Santiago Zanella Béguelin , Gustavo Betarte , Carlos Luna A Formal Specification of the MIDP 2.0 Security Model. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:220-234 [Conf ] Ron van der Meyden , Chenyi Zhang A Comparison of Semantic Models for Noninterference. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:235-249 [Conf ] Danièle Beauquier , Ruggero Lanotte Hiding Information in Multi Level Security Systems. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:250-269 [Conf ] Chunqi Tian , Shihong Zou , Wendong Wang , Shiduan Cheng A New Trust Model Based on Advanced D-S Evidence Theory for P2P Networks. [Citation Graph (0, 0)][DBLP ] Formal Aspects in Security and Trust, 2006, pp:270-284 [Conf ]