Controlled query evaluation with open queries for a decidable relational submodel
Annals of Mathematics and Artificial Intelligence
Formal Modelling of PKI Based Authentication
Electronic Notes in Theoretical Computer Science (ENTCS)
A Mechanism for Identity Delegation at Authentication Level
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
The architecture of SAAIDS: Secured Autonomous Agent-based Intrusion Detection System
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Proceedings of the 15th Conference on Pattern Languages of Programs
Unifying facets of information integrity
ICISS'10 Proceedings of the 6th international conference on Information systems security
A security-aware refactoring tool for Java programs
Proceedings of the 4th Workshop on Refactoring Tools
Security'08 Proceedings of the 16th International conference on Security protocols
DNIS'10 Proceedings of the 6th international conference on Databases in Networked Information Systems
Inference-usability confinement by maintaining inference-proof views of an information system
International Journal of Computational Science and Engineering
STM'11 Proceedings of the 7th international conference on Security and Trust Management
Enforcing confidentiality in relational databases by reducing inference control to access control
ISC'07 Proceedings of the 10th international conference on Information Security
Access control for semantic data federations in industrial product-lifecycle management
Computers in Industry
GlassTube: a lightweight approach to web application integrity
Proceedings of the Eighth ACM SIGPLAN workshop on Programming languages and analysis for security
Hi-index | 0.00 |