nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An overview of the verification of SET
|
Bella, Giampaolo |
|
2005 |
4 |
1-2 |
p. 17-28 |
artikel |
2 |
Detection of file-based race conditions
|
Lhee, Kyung-suk |
|
2005 |
4 |
1-2 |
p. 105-119 |
artikel |
3 |
Edit automata: enforcement mechanisms for run-time security policies
|
Ligatti, Jay |
|
2004 |
4 |
1-2 |
p. 2-16 |
artikel |
4 |
Game strategies in network security
|
Lye, Kong-wei |
|
2005 |
4 |
1-2 |
p. 71-86 |
artikel |
5 |
On the decidability of cryptographic protocolswith open-ended data structures
|
Küsters, Ralf |
|
2004 |
4 |
1-2 |
p. 49-70 |
artikel |
6 |
On the sequence of authorization policy transformations
|
Bai, Yun |
|
2005 |
4 |
1-2 |
p. 120-131 |
artikel |
7 |
Preface to the special issue of selected papers from FCS/VERIFY 2002
|
Autexier, Serge |
|
2004 |
4 |
1-2 |
p. 1 |
artikel |
8 |
Rigorous automated network security management
|
Guttman, Joshua D. |
|
2004 |
4 |
1-2 |
p. 29-48 |
artikel |
9 |
Static use-based object confinement
|
Skalka, Christian |
|
2004 |
4 |
1-2 |
p. 87-104 |
artikel |