The SCEAS System
Navigation Menu

Conferences in DBLP

Conference on Computer and Communications Security (CCS) (ccs)
2003 (conf/ccs/2003fmse)

  1. Hongbin Zhou, Simon N. Foley
    Fast automatic synthesis of security protocols using backward search. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:1-10 [Conf]
  2. Anupam Datta, Ante Derek, John C. Mitchell, Dusko Pavlovic
    Secure protocol composition. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:11-23 [Conf]
  3. Michael R. Hansen, Robin Sharp
    Using interval logics for temporal analysis of security protocols. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:24-31 [Conf]
  4. François Siewe, Antonio Cau, Hussein Zedan
    A compositional framework for access control policies enforcement. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:32-42 [Conf]
  5. Sviatoslav Braynov, Murtuza Jadliwala
    Representation and analysis of coordinated attacks. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:43-51 [Conf]
  6. Mohamed Hamdi, Noureddine Boudriga
    Algebraic specification of network security risk management. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:52-60 [Conf]
  7. Michael Backes, Catherine Meadows, John C. Mitchell
    Relating cryptography and formal methods: a panel. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:61-66 [Conf]
  8. Manuel Koch, Francesco Parisi-Presicce
    Formal access control analysis in the software development process. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:67-76 [Conf]
  9. Khaled Alghathbar, Duminda Wijesekera
    authUML: a three-phased framework to analyze access control specifications in use cases. [Citation Graph (0, 0)][DBLP]
    FMSE, 2003, pp:77-86 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002