The Z notation: a reference manual
The Z notation: a reference manual
Symbolic Boolean manipulation with ordered binary-decision diagrams
ACM Computing Surveys (CSUR)
A shortest path network security model
Computers and Security
Symbolic model checking: 1020 states and beyond
Information and Computation - Special issue: Selections from 1990 IEEE symposium on logic in computer science
Proceedings of the 4th ACM conference on Computer and communications security
NSPW '97 Proceedings of the 1997 workshop on New security paradigms
The Complexity and Composability of Secure Interoperation
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
Toward acceptable metrics of authentication
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Some weaknesses of the TCB model
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Modeling and detecting the cascade vulnerability problem using soft constraints
Proceedings of the 2004 ACM symposium on Applied computing
A soft constraint-based approach to the cascade vulnerability problem
Journal of Computer Security - Special issue on security track at ACM symposium on applied computing 2004
Configuring storage-area networks using mandatory security
Journal of Computer Security
IAAI'04 Proceedings of the 16th conference on Innovative applications of artifical intelligence
Security protocol deployment risk
Security'08 Proceedings of the 16th International conference on Security protocols
Hi-index | 0.00 |