|
Conferences in DBLP
(crisis) 2009 (conf/crisis/2009)
A logical framework for reasoning about policies with trust negotiations and workflows in a distributed environment. [Citation Graph (, )][DBLP]
A secured delegation of remote services on IPv6 home networks. [Citation Graph (, )][DBLP]
CryptoNET: Secure federation protocol and authorization policies for SMI. [Citation Graph (, )][DBLP]
Formal analysis of attacks for e-voting system. [Citation Graph (, )][DBLP]
Data disclosure risk evaluation. [Citation Graph (, )][DBLP]
Runtime verification of declassification for imperative programs: Formal foundations. [Citation Graph (, )][DBLP]
SIDAN: A tool dedicated to software instrumentation for detecting attacks on non-control-data. [Citation Graph (, )][DBLP]
Re-inforced stealth breakpoints. [Citation Graph (, )][DBLP]
Permutation-based steganographic channels. [Citation Graph (, )][DBLP]
A formal methodology for detection of vulnerabilities in an enterprise information system. [Citation Graph (, )][DBLP]
A reference model for risk-aware business process management. [Citation Graph (, )][DBLP]
Risk analysis via heterogeneous models of SCADA interconnecting Power Grids and Telco networks. [Citation Graph (, )][DBLP]
Greylisting - long term analysis of anti-SPAM effect. [Citation Graph (, )][DBLP]
Experiments and data analysis of electronic voting system. [Citation Graph (, )][DBLP]
Modeling dependencies in security risk management. [Citation Graph (, )][DBLP]
A quantitative approach to assess information security related risks. [Citation Graph (, )][DBLP]
Untrustworthiness: A trust-based security metric. [Citation Graph (, )][DBLP]
Honeypot router for routing protocols protection. [Citation Graph (, )][DBLP]
A formal design of secure information systems by using a Formal Secure Data Flow Diagram (FSDFD). [Citation Graph (, )][DBLP]
|