|
Conferences in DBLP
- Mario Bravetti, Nadia Busi, Roberto Gorrieri, Roberto Lucchi, Gianluigi Zavattaro
Security Issues in the Tuple-Space Coordination Model. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:1-12 [Conf]
- Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo Troina
Information Flow Analysis for Probabilistic Timed Automata. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:13-26 [Conf]
- Lantian Zheng, Andrew C. Myers
Dynamic Security Labels and Noninterference (Extended Abstract). [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:27-40 [Conf]
- Jan Cederquist, Muhammad Torabi Dashti
Formal Analysis of a Fair Payment Protocol. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:41-54 [Conf]
- Christian Haack, Alan Jeffrey
Pattern-Matching Spi-Calculus. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:55-70 [Conf]
- Laurent Mazaré
Decidability of Opacity with Non-Atomic Keys. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:71-84 [Conf]
- Jerry den Hartog, Erik P. de Vink
Virtual Analysis and Reduction of Side-Channel Vulnerabilities of Smartcards. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:85-98 [Conf]
- James Heather, Jonathan Y. Clark
Family Secrets. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:99-114 [Conf]
- Hristo Koshutanski, Fabio Massacci
An Interactive Trust Management and Negotiation Scheme. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:115-128 [Conf]
- Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock, Greg Maitland
Complementing Computational Protocol Analysis with Formal Specifications. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:129-144 [Conf]
- Jianqiang Shi, Gregor von Bochmann, Carlisle M. Adams
A Trust Model with Statistical Foundation. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:145-158 [Conf]
- Jeremy Bryans, Maciej Koutny, Peter Y. A. Ryan
Modelling Dynamic Opacity Using Petri Nets with Silent Actions. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:159-172 [Conf]
- Stefano Bistarelli, Simon N. Foley, Barry O'Sullivan
Reasoning about Secure Interoperation Using Soft Constraints. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:173-186 [Conf]
- Ricardo Corin, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini, I. Staicu
A Logic for Auditing Accountability in Decentralized Systems. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:187-201 [Conf]
- Frédéric Cuppens, Nora Cuppens-Boulahia, Thierry Sans, Alexandre Miège
A Formal Approach to Specify and Deploy a Network Security Policy. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:203-218 [Conf]
- Erik Rissanen, Babak Sadighi Firozabadi, Marek J. Sergot
Discretionary Overriding of Access Control in the Privilege Calculus. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:219-232 [Conf]
- Ali E. Abdallah, Etienne J. Khayat
A Formal Model for Parameterized Role-Based Access Control. [Citation Graph (0, 0)][DBLP] Formal Aspects in Security and Trust, 2004, pp:233-246 [Conf]
|