Found: 9
Select item for more details and to access through your institution.
On the decidability of cryptographic protocols with open-ended data structures.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 49, doi. 10.1007/s10207-004-0050-z
- By:
- Publication type:
- Article
Edit automata: enforcement mechanisms for run-time security policies.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 2, doi. 10.1007/s10207-004-0046-8
- By:
- Publication type:
- Article
Static use-based object confinement.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 87, doi. 10.1007/s10207-004-0049-5
- By:
- Publication type:
- Article
Rigorous automated network security management.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 29, doi. 10.1007/s10207-004-0052-x
- By:
- Publication type:
- Article
Preface to the special issue of selected papers from FCS/VERIFY 2002.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 1, doi. 10.1007/s10207-004-0053-9
- By:
- Publication type:
- Article
An overview of the verification of SET.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 17, doi. 10.1007/s10207-004-0047-7
- By:
- Publication type:
- Article
Detection of file-based race conditions.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 105, doi. 10.1007/s10207-004-0068-2
- By:
- Publication type:
- Article
On the sequence of authorization policy transformations.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 120, doi. 10.1007/s10207-004-0069-1
- By:
- Publication type:
- Article
Game strategies in network security.
- Published in:
- International Journal of Information Security, 2005, v. 4, n. 1/2, p. 71, doi. 10.1007/s10207-004-0060-x
- By:
- Publication type:
- Article