Works matching IS 16155262 AND DT 2005 AND VI 4 AND IP 1/2


Results: 9
    1
    2
    3

    Static use-based object confinement.

    Published in:
    International Journal of Information Security, 2005, v. 4, n. 1/2, p. 87, doi. 10.1007/s10207-004-0049-5
    By:
    • Skalka, Christian;
    • Smith, Scott
    Publication type:
    Article
    4
    5
    6

    An overview of the verification of SET.

    Published in:
    International Journal of Information Security, 2005, v. 4, n. 1/2, p. 17, doi. 10.1007/s10207-004-0047-7
    By:
    • Bella, Giampaolo;
    • Massacci, Fabio;
    • Paulson, Lawrence C.
    Publication type:
    Article
    7

    Game strategies in network security.

    Published in:
    International Journal of Information Security, 2005, v. 4, n. 1/2, p. 71, doi. 10.1007/s10207-004-0060-x
    By:
    • Lye, Kong-wei;
    • Wing, Jeannette M.
    Publication type:
    Article
    8

    Detection of file-based race conditions.

    Published in:
    International Journal of Information Security, 2005, v. 4, n. 1/2, p. 105, doi. 10.1007/s10207-004-0068-2
    By:
    • Lhee, Kyung-suk;
    • Chapin, Steve J.
    Publication type:
    Article
    9