nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A formal model for pricing information systems insurance contracts
|
Lambrinoudakis, Costas |
|
2005 |
27 |
5 |
p. 521-532 12 p. |
artikel |
2 |
A service-centric model for intrusion detection in next-generation networks
|
McGibney, Jimmy |
|
2005 |
27 |
5 |
p. 513-520 8 p. |
artikel |
3 |
A structured operational semantic modelling of the Dolev–Yao threat environment and its composition with cryptographic protocols
|
Mao, Wenbo |
|
2005 |
27 |
5 |
p. 479-488 10 p. |
artikel |
4 |
Editorial Board
|
|
|
2005 |
27 |
5 |
p. iii- 1 p. |
artikel |
5 |
Evidence processing and privacy issues in evidence-based reputation systems
|
Cvrček, Daniel |
|
2005 |
27 |
5 |
p. 533-545 13 p. |
artikel |
6 |
Formal methods, techniques and tools for secure and reliable applications
|
Patel, Ahmed |
|
2005 |
27 |
5 |
p. 439-443 5 p. |
artikel |
7 |
On a formal framework for security properties
|
Gürgens, Sigrid |
|
2005 |
27 |
5 |
p. 457-466 10 p. |
artikel |
8 |
Security-enabled code deployment for heterogeneous networks
|
Karnouskos, Stamatis |
|
2005 |
27 |
5 |
p. 547-560 14 p. |
artikel |
9 |
Security protocols analysis: A SDL-based approach
|
Lopez, Javier |
|
2005 |
27 |
5 |
p. 489-499 11 p. |
artikel |
10 |
Specification and design of advanced authentication and authorization services
|
Lopez, Javier |
|
2005 |
27 |
5 |
p. 467-478 12 p. |
artikel |
11 |
Specifying Privacy-Preserving Protocols in Typed MSR
|
Balopoulos, Theodoros |
|
2005 |
27 |
5 |
p. 501-512 12 p. |
artikel |
12 |
Using a security requirements engineering methodology in practice: The compliance with the Italian data protection legislation
|
Massacci, Fabio |
|
2005 |
27 |
5 |
p. 445-455 11 p. |
artikel |