The SCEAS System
Navigation Menu

Journals in DBLP

Int. J. Inf. Sec.
2007, volume: 6, number: 2-3

  1. Theodosis Dimitrakos, Fabio Martinelli, Peter Y. A. Ryan, Steve Schneider
    Guest Editors' Preface. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:65-66 [Journal]
  2. Lantian Zheng, Andrew C. Myers
    Dynamic security labels and static information flow control. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:67-84 [Journal]
  3. Nicoletta De Francesco, Luca Martini
    Instruction-level security typing by abstract interpretation. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:85-106 [Journal]
  4. Boris Köpf, Heiko Mantel
    Transformational typing and unification for automatically correcting insecure programs. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:107-131 [Journal]
  5. J. G. Cederquist, Ricardo Corin, M. A. C. Dekker, Sandro Etalle, J. I. den Hartog, Gabriele Lenzini
    Audit-based compliance control. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:133-151 [Journal]
  6. Karl Krukow, Mogens Nielsen
    Trust structures. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:153-181 [Journal]
  7. Rob Delicata, Steve Schneider
    An algebraic approach to the verification of a class of Diffie-Hellman protocols. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2007, v:6, n:2-3, pp:183-196 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002