The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2007 (conf/ccs/2007fmse)


  1. Formal methods in security engineering: where we've been, where we are, where we need to go. [Citation Graph (, )][DBLP]


  2. Verification condition generation for conditional information flow. [Citation Graph (, )][DBLP]


  3. A simple and expressive semantic framework for policy composition in access control. [Citation Graph (, )][DBLP]


  4. Formal correctness of conflict detection for firewalls. [Citation Graph (, )][DBLP]


  5. Security policy compliance with violation management. [Citation Graph (, )][DBLP]


  6. Cryptol: specification, implementation and verification of high-grade cryptographic applications. [Citation Graph (, )][DBLP]


  7. Security policy analysis using deductive spreadsheets. [Citation Graph (, )][DBLP]


  8. A calculus of challenges and responses. [Citation Graph (, )][DBLP]


  9. Selecting theories and nonce generation for recursive protocols. [Citation Graph (, )][DBLP]


  10. Weaving rewrite-based access control policies. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002