no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
An overview of the verification of SET
|
Bella, Giampaolo |
|
2005 |
4 |
1-2 |
p. 17-28 |
article |
2 |
Detection of file-based race conditions
|
Lhee, Kyung-suk |
|
2005 |
4 |
1-2 |
p. 105-119 |
article |
3 |
Edit automata: enforcement mechanisms for run-time security policies
|
Ligatti, Jay |
|
2004 |
4 |
1-2 |
p. 2-16 |
article |
4 |
Game strategies in network security
|
Lye, Kong-wei |
|
2005 |
4 |
1-2 |
p. 71-86 |
article |
5 |
On the decidability of cryptographic protocolswith open-ended data structures
|
Küsters, Ralf |
|
2004 |
4 |
1-2 |
p. 49-70 |
article |
6 |
On the sequence of authorization policy transformations
|
Bai, Yun |
|
2005 |
4 |
1-2 |
p. 120-131 |
article |
7 |
Preface to the special issue of selected papers from FCS/VERIFY 2002
|
Autexier, Serge |
|
2004 |
4 |
1-2 |
p. 1 |
article |
8 |
Rigorous automated network security management
|
Guttman, Joshua D. |
|
2004 |
4 |
1-2 |
p. 29-48 |
article |
9 |
Static use-based object confinement
|
Skalka, Christian |
|
2004 |
4 |
1-2 |
p. 87-104 |
article |