Network simulations with OPNET
Proceedings of the 31st conference on Winter simulation: Simulation---a bridge to the future - Volume 1
The AltaRica formalism for describing concurrent systems
Fundamenta Informaticae - Special issue prepared in tribute to Peter Ernst on the occasion of his retirement
Mathematical Models of Computer Security
FOSAD '00 Revised versions of lectures given during the IFIP WG 1.7 International School on Foundations of Security Analysis and Design on Foundations of Security Analysis and Design: Tutorial Lectures
From Security to Safety and Back
CSDA '98 Proceedings of the Conference on Computer Security, Dependability, and Assurance: From Needs to Solutions
Understanding Replication in Databases and Distributed Systems
ICDCS '00 Proceedings of the The 20th International Conference on Distributed Computing Systems ( ICDCS 2000)
IWSSD '98 Proceedings of the 9th international workshop on Software specification and design
Basic Concepts and Taxonomy of Dependable and Secure Computing
IEEE Transactions on Dependable and Secure Computing
Towards an Integrated Conceptual Model of Security and Dependability
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
International Working Group on Assurance Cases (for Security)
IEEE Security and Privacy
Communications of the ACM - Emergency response information systems: emerging trends and technologies
Security Assurance Aggregation for IT Infrastructures
ICSNC '07 Proceedings of the Second International Conference on Systems and Networks Communications
On System Security Metrics and the Definition Approaches
SECURWARE '08 Proceedings of the 2008 Second International Conference on Emerging Security Information, Systems and Technologies
The Monoculture Risk Put into Context
IEEE Security and Privacy
An introduction to biometric recognition
IEEE Transactions on Circuits and Systems for Video Technology
Attack and defense modeling with BDMP
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Hi-index | 0.00 |
Trust management is turning out to be essential for further and wider acceptance of contemporary IT solutions. In IT world it was first addressed some ten years ago when the suggested approaches were actually tackling security and not trust directly. ...