|
Conferences in DBLP
- Michele Bugliesi, Riccardo Focardi, Matteo Maffei
Authenticity by tagging and typing. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:1-12 [Conf]
- Gilles Barthe, Leonor Prensa Nieto
Formally verifying information flow type systems for concurrent and thread systems. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:13-22 [Conf]
- Ricardo Corin, Sandro Etalle, Pieter H. Hartel, Angelika Mader
Timed model checking of security protocols. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:23-32 [Conf]
- Phan Minh Dung, Phan Minh Thang
Stepwise development of security protocols: a speech act-oriented approach. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:33-44 [Conf]
- Lingyu Wang, Duminda Wijesekera, Sushil Jajodia
A logic-based framework for attribute based access control. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:45-55 [Conf]
- Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
Synthesising verified access control systems in XACML. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:56-65 [Conf]
- Tomás E. Uribe, Steven Cheung
Automatic analysis of firewall and network intrusion detection system configurations. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:66-74 [Conf]
- Thuong Doan, Steven A. Demurjian, T. C. Ting, Andreas Ketterl
MAC and UML for secure software design. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:75-85 [Conf]
- Brant Hashii
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture. [Citation Graph (0, 0)][DBLP] FMSE, 2004, pp:86-95 [Conf]
|