Volume 4; Issue 1-2

2

An overview of the verification of SET

Year:
2005
Language:
english
File:
PDF, 951 KB
english, 2005
3

Static use-based object confinement

Year:
2005
Language:
english
File:
PDF, 1.09 MB
english, 2005
5

Rigorous automated network security management

Year:
2005
Language:
english
File:
PDF, 541 KB
english, 2005
7

Game strategies in network security

Year:
2005
Language:
english
File:
PDF, 841 KB
english, 2005
8

Detection of file-based race conditions

Year:
2005
Language:
english
File:
PDF, 701 KB
english, 2005
9

On the sequence of authorization policy transformations

Year:
2005
Language:
english
File:
PDF, 229 KB
english, 2005