A Formal Security Model for Microprocessor Hardware
IEEE Transactions on Software Engineering
A Formal Security Model for Microprocessor Hardware
FM '99 Proceedings of the Wold Congress on Formal Methods in the Development of Computing Systems-Volume I - Volume I
Privacy through pseudonymity in user-adaptive systems
ACM Transactions on Internet Technology (TOIT)
Least-restrictive enforcement of the Chinese wall security policy
Proceedings of the 18th ACM symposium on Access control models and technologies
Hi-index | 0.00 |