|
Conferences in DBLP
- Hongbin Zhou, Simon N. Foley
Fast automatic synthesis of security protocols using backward search. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:1-10 [Conf]
- Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
Secure protocol composition. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:11-23 [Conf]
- Michael R. Hansen, Robin Sharp
Using interval logics for temporal analysis of security protocols. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:24-31 [Conf]
- François Siewe, Antonio Cau, Hussein Zedan
A compositional framework for access control policies enforcement. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:32-42 [Conf]
- Sviatoslav Braynov, Murtuza Jadliwala
Representation and analysis of coordinated attacks. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:43-51 [Conf]
- Mohamed Hamdi, Noureddine Boudriga
Algebraic specification of network security risk management. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:52-60 [Conf]
- Michael Backes, Catherine Meadows, John C. Mitchell
Relating cryptography and formal methods: a panel. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:61-66 [Conf]
- Manuel Koch, Francesco Parisi-Presicce
Formal access control analysis in the software development process. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:67-76 [Conf]
- Khaled Alghathbar, Duminda Wijesekera
authUML: a three-phased framework to analyze access control specifications in use cases. [Citation Graph (0, 0)][DBLP] FMSE, 2003, pp:77-86 [Conf]
|