|
Conferences in DBLP
- Michael J. May, Wook Shin, Carl A. Gunter, Insup Lee
Securing the drop-box architecture for assisted living. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:1-12 [Conf]
- Silvia Crafa, Sabina Rossi
P-congruences as non-interference for the pi-calculus. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:13-22 [Conf]
- Jan Cederquist, Muhammad Torabi Dashti
An intruder model for verifying liveness in security protocols. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:23-32 [Conf]
- Geoffrey Smith
Secure information flow with random assignment and encryption. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:33-44 [Conf]
- Adam J. Lee, Jodie P. Boyer, Lars Olson, Carl A. Gunter
Defeasible security policy composition for web services. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:45-54 [Conf]
- Prasad Naldurg, Stefan Schwoon, Sriram K. Rajamani, John Lambert
NETRA: : seeing through access control. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:55-66 [Conf]
- Lieven Desmet, Frank Piessens, Wouter Joosen, Pierre Verbaeten
Bridging the gap between web application firewalls and web applications. [Citation Graph (0, 0)][DBLP] FMSE, 2006, pp:67-77 [Conf]
|