The SCEAS System
Navigation Menu

Conferences in DBLP

IFIP WG 1.7 Publications (ifip1-7)
2004 (conf/ifip1-7/2004)

  1. Mario Bravetti, Nadia Busi, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro
    Security Issues in the Tuple-Space Coordination Model. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:1-12 [Conf]
  2. Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina
    Information Flow Analysis for Probabilistic Timed Automata. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:13-26 [Conf]
  3. Lantian Zheng, Andrew C. Myers
    Dynamic Security Labels and Noninterference (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:27-40 [Conf]
  4. Jan Cederquist, Muhammad Torabi Dashti
    Formal Analysis of a Fair Payment Protocol. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:41-54 [Conf]
  5. Christian Haack, Alan Jeffrey
    Pattern-Matching Spi-Calculus. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:55-70 [Conf]
  6. Laurent Mazaré
    Decidability of Opacity with Non-Atomic Keys. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:71-84 [Conf]
  7. Jerry den Hartog, Erik P. de Vink
    Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:85-98 [Conf]
  8. James Heather, Jonathan Y. Clark
    Family Secrets. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:99-114 [Conf]
  9. Hristo Koshutanski, Fabio Massacci
    An Interactive Trust Management and Negotiation Scheme. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:115-128 [Conf]
  10. Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
    Complementing Computational Protocol Analysis with Formal Specifications. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:129-144 [Conf]
  11. Jianqiang Shi, Gregor von Bochmann, Carlisle M. Adams
    A Trust Model with Statistical Foundation. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:145-158 [Conf]
  12. Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan
    Modelling Dynamic Opacity Using Petri Nets with Silent Actions. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:159-172 [Conf]
  13. Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
    Reasoning about Secure Interoperation Using Soft Constraints. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:173-186 [Conf]
  14. Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu
    A Logic for Auditing Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:187-201 [Conf]
  15. Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège
    A Formal Approach to Specify and Deploy a Network Security Policy. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:203-218 [Conf]
  16. Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot
    Discretionary Overriding of Access Control in the Privilege Calculus. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:219-232 [Conf]
  17. Ali E. Abdallah, Etienne J. Khayat
    A Formal Model for Parameterized Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    Formal Aspects in Security and Trust, 2004, pp:233-246 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002