Journals in DBLP
Serge Autexier , Iliano Cervesato , Heiko Mantel Preface to the special issue of selected papers from FCS/VERIFY 2002. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:1- [Journal ] Jay Ligatti , Lujo Bauer , David Walker Edit automata: enforcement mechanisms for run-time security policies. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:2-16 [Journal ] Giampaolo Bella , Fabio Massacci , Lawrence C. Paulson An overview of the verification of SET. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:17-28 [Journal ] Joshua D. Guttman , Amy L. Herzog Rigorous automated network security management. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:29-48 [Journal ] Ralf Küsters On the decidability of cryptographic protocols with open-ended data structures. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:49-70 [Journal ] Kong-wei Lye , Jeannette M. Wing Game strategies in network security. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:71-86 [Journal ] Christian Skalka , Scott F. Smith Static use-based object confinement. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:87-104 [Journal ] Kyung-suk Lhee , Steve J. Chapin Detection of file-based race conditions. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:105-119 [Journal ] Yun Bai , Yan Zhang , Vijay Varadharajan On the sequence of authorization policy transformations. [Citation Graph (0, 0)][DBLP ] Int. J. Inf. Sec., 2005, v:4, n:1-2, pp:120-131 [Journal ]