A policy-based methodology for security evaluation: A Security Metric for Public Key Infrastructures
Journal of Computer Security
The epistemology of computer security
ACM SIGSOFT Software Engineering Notes
What is the shape of your security policy?: security as a classification problem
NSPW '09 Proceedings of the 2009 workshop on New security paradigms workshop
Multi-level security for service-oriented architectures
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
A knowledge-based verification method for dynamic access control policies
ICFEM'11 Proceedings of the 13th international conference on Formal methods and software engineering
Practical end-to-end web content integrity
Proceedings of the 21st international conference on World Wide Web
Information Systems and e-Business Management
Policy administration in tag-based authorization
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Hi-index | 0.00 |
When will we be secure? Nobody knows for surebut it cannot happen before commercial security products and services possess not only enough functionality to satisfy customers' stated needs, but also sufficient assurance of quality, reliability, safety, ...