|
Journals in DBLP
- Valentina Casola, Antonino Mazzeo, Nicola Mazzocca, Valeria Vittorini
A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2007, v:15, n:2, pp:197-229 [Journal]
- Mahesh V. Tripunitara, Ninghui Li
A theory for comparing the expressive power of access control models. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2007, v:15, n:2, pp:231-272 [Journal]
- Victor A. Skormin, Alexander Volynkin, Douglas H. Summerville, James Moronski
Prevention of information attacks by run-time detection of self-replication in computer codes. [Citation Graph (0, 0)][DBLP] Journal of Computer Security, 2007, v:15, n:2, pp:273-302 [Journal]
|