Specification and formal verification of security requirements
CompSysTech '04 Proceedings of the 5th international conference on Computer systems and technologies
A Holistic Approach to Security Policies -- Policy Distribution with XACML over COPS
Electronic Notes in Theoretical Computer Science (ENTCS)
Secure Web Service Workflow Execution
Electronic Notes in Theoretical Computer Science (ENTCS)
Modelling and analysing network security policies in a given vulnerability setting
CRITIS'06 Proceedings of the First international conference on Critical Information Infrastructures Security
Hi-index | 0.00 |