A formal protection model of security in centralized, parallel, and distributed systems
ACM Transactions on Computer Systems (TOCS)
UNIX password security—ten years later
CRYPTO '89 Proceedings on Advances in cryptology
Representing and using nonfunctional requirements: a process-oriented approach
IEEE Transactions on Software Engineering - Special issue on knowledge representation and reasoning in software development
Management guidelines for PC security
SAC '92 Proceedings of the 1992 ACM/SIGAPP symposium on Applied computing: technological challenges of the 1990's
Management guidelines for PC security
ACM SIGSMALL/PC Notes
A taxonomy for secure object-oriented databases
ACM Transactions on Database Systems (TODS)
Management guidelines for PC security
ACM SIGICE Bulletin
Small computers and security: an oxymoron?
ACM SIGICE Bulletin
A taxonomy of computer program security flaws
ACM Computing Surveys (CSUR)
ACM SIGAPP Applied Computing Review - Special issue on security
Flexible security policies for digital libraries
ACM Computing Surveys (CSUR) - Special issue: position statements on strategic directions in computing research
Role based access control on MLS systems without kernel changes
RBAC '98 Proceedings of the third ACM workshop on Role-based access control
A new security policy for distributed resource management and access control
NSPW '96 Proceedings of the 1996 workshop on New security paradigms
Application of security tot he computing science classroom
Proceedings of the thirty-first SIGCSE technical symposium on Computer science education
Towards a configurable security architecture
Data Engineering
Information Processing Letters
Enhanced Password Authentication through Fuzzy Logic
IEEE Expert: Intelligent Systems and Their Applications
Representing and Using Nonfunctional Requirements: A Process-Oriented Approach
IEEE Transactions on Software Engineering - Special issue on knowledge representation and reasoning in software development
An Interactive Cryptanalysis Algorithm for the Vigenere Cipher
ADVIS '00 Proceedings of the First International Conference on Advances in Information Systems
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Performance Analysis of the Kerberos Protocol in a Distributed Environment
ISCC '97 Proceedings of the 2nd IEEE Symposium on Computers and Communications (ISCC '97)
Synthesis of fault-tolerant concurrent programs
ACM Transactions on Programming Languages and Systems (TOPLAS)
Anonymous Wireless Authentication on a Portable Cellular Mobile System
IEEE Transactions on Computers
Towards a more effective way of teaching a cybersecurity basics course
Working group reports from ITiCSE on Innovation and technology in computer science education
Encyclopedia of Computer Science
Teaching hands-on Linux host computer security
Journal on Educational Resources in Computing (JERIC)
Market Reactions to Information Security Breach Announcements: An Empirical Analysis
International Journal of Electronic Commerce
Protection of a mobile agent with a reference clone
Computer Communications
Cryptanalysis of white-box DES implementations with arbitrary external encodings
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Risk management with ISO 27000 standards in information security
ISPACT'10 Proceedings of the 9th WSEAS international conference on Advances in e-activities, information security and privacy
Global transaction control with multilevel security environments
FSKD'06 Proceedings of the Third international conference on Fuzzy Systems and Knowledge Discovery
A fair multimedia exchange protocol
ISCIS'05 Proceedings of the 20th international conference on Computer and Information Sciences
SP 800-12. An Introduction to Computer Security: the NIST Handbook
SP 800-12. An Introduction to Computer Security: the NIST Handbook
Hi-index | 0.00 |