Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Jonas Pfoh, Christian A. Schneider, Claudia Eckert 0001 |
Exploiting the x86 Architecture to Derive Virtual Machine State Information. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Valeros Bernardo, Doan Hoang |
Protecting Next Generation High Speed Network Protocol - UDT through Generic Security Service Application Program Interface - GSS-API. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Dongkyun Ahn, Gyungho Lee |
Prospect of Fine Grain Dynamic Memory Access Control with Profiling. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mathieu Blanc, Jérémy Briffaut, Thibault Coullet, Maxime Fonda, Christian Toinard |
Protection of a Shared HPC Cluster. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Hiroto Kakiuchi, Takao Kawamura, Toshihiko Sasama, Kazunori Sugahara |
Detection Methods Improving Reliability of Automatic Human Tracking System. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Homam El-Taj, Omar Abouabdalla, Ahmed M. Manasrah, Ahmed Al-Madi, Muhammad Imran Sarwar, Sureswaran Ramadass |
Forthcoming Aggregating Intrusion Detection System Alerts Framework. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Praveen Bommannavar, Nicholas Bambos |
Patch Scheduling for Risk Exposure Mitigation under Service Disruption Constraints. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ali Ahmed 0001, Ning Zhang 0001 |
An Access Control Architecture for Context-Risk-Aware Access Control: Architectural Design and Performance Evaluation. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Boulares Ouchenne, Ousmane Koné |
A Security Control Architecture for SOAP-Based Services. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | S. Hasan Mirjalili, Arjen K. Lenstra |
Towards a Structural Secure Design Process. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Donghai Tian, Deguang Kong, Changzhen Hu, Peng Liu 0005 |
Protecting Kernel Data through Virtualization Technology. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Mohit Soni, Sandesh Gupta, M. S. Rao, Phalguni Gupta |
An Efficient Vein Pattern-Based Recognition System. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sarosh Hashmi, John Brooke |
Towards Sybil Resistant Authentication in Mobile Ad Hoc Networks. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Beritelli, Salvatore Casale, Rosario Grasso, Andrea Spadaccini |
Performance Evaluation of SNR Estimation Methods in Forensic Speaker Recognition. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cagatay Karabat, Mehmet Keskinöz |
Blind Detectors in Spread Spectrum Watermarking for Interference Reduction. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Feng Bao 0001 |
A Shuffling Scheme with Strict and Strong Security. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Alireza Shahrestani, Maryam Feily, Rodina Binti Ahmad, Sureswaran Ramadass |
Discovery of Invariant Bot Behavior through Visual Network Monitoring System. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Titi, Jean-Marc Seigneur |
Verifying Hotspot Quality User Rating with Certified QoS Evidence. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Thomas C. Ormerod, Lingyu Wang 0001, Mourad Debbabi, Amr M. Youssef, Hamad Binsalleeh, Amine Boukhtouta, Prosenjit Sinha |
Defaming Botnet Toolkits: A Bottom-Up Approach to Mitigating the Threat. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pekka Pietikäinen, Kati Karjalainen, Juha Röning, Juhani Eronen |
Socio-technical Security Assessment of a VoIP System. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Fan Wu 0013, Chung-Han Chen, Hira N. Narang |
An Efficient Acceleration of Symmetric Key Cryptography Using General Purpose Graphics Processing Unit. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pierre de Leusse, Theo Dimitrakos |
SOA-Based Security Governance Middleware. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Bilal Khan, Muhammad Khurram Khan, Maqsood Mahmud, Khaled Alghathbar |
Security Analysis of Firewall Rule Sets in Computer Networks. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jin Tamura |
Improving the Efficiency of a Highly-Used Access Control Scheme. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ahlem Bouchahda, Nhan Le Thanh, Adel Bouhoula, Faten Labbene |
RBAC+: Dynamic Access Control for RBAC-Administered Web-Based Databases. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Anders Fongen |
Identity Management without Revocation. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wolfgang Boehmer |
Analysis of Strongly and Weakly Coupled Management Systems in Information Security. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Rouzaud-Cornabas, Patrice Clemente, Christian Toinard |
An Information Flow Approach for Preventing Race Conditions: Dynamic Protection of the Linux OS. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tewfiq El Maliki, Jean-Marc Seigneur |
A Security Adaptation Reference Monitor (SARM) for Highly Dynamic Wireless Environments. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Rainer Falk, Hans-Joachim Hof |
Industrial Sensor Network Security Architecture. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Daniel Hartung, Christoph Busch 0001 |
Biometric Transaction Authentication Protocol. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jaziar Radianti |
A Study of a Social Behavior inside the Online Black Markets. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Tamás Paulik, Ádám Máté Földes, Gábor György Gulyás |
BlogCrypt: Private Content Publishing on the Web. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Abdel Alim Kamal, Amr M. Youssef |
Applications of SAT Solvers to AES Key Recovery from Decayed Key Schedule Images. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Sedat Soydan |
Analyzing the DPA Leakage of the Masked S-box via Digital Simulation and Reducing the Leakage by Inserting Delay Cells. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Manfred Schäfer, Wolf-Dietrich Moeller |
Strategies for Managed Software Integrity Protection. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Keunwoo Rhee, Byunghee Lee, Dongho Won, Hac Yun Na, Seungjoo Kim |
Vulnerabilities and Improvements of Du-Xiao-Chen-Wu's Secure Cell Relay Routing Protocol for Sensor Networks. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Francisco José Bellido Outeiriño, Pedro Canales Aranda, José Luis de la Cruz Fernández, Benito Pérez Jarauta |
Universal Bluetooth Access Control and Security System for e-Keys Enviroments. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ravishankar Borgaonkar |
An Analysis of the Asprox Botnet. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Pierluigi Failla |
Heuristic Search in Encrypted Graphs. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jaziar Radianti |
Eliciting Information on the Vulnerability Black Market from Interviews. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Masaru Takesue |
Cascaded Simple Filters for Accurate and Lightweight Email-Spam Detection. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Francesco Beritelli, Andrea Spadaccini |
A Statistical Approach to Biometric Identity Verification Based on Heart Sounds. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Reijo Savola, Masaru Takesue, Rainer Falk, Manuela Popescu (eds.) |
Fourth International Conference on Emerging Security Information Systems and Technologies, SECURWARE 2010, Venice, Italy, July 18-25, 2010 |
SECURWARE |
2010 |
DBLP BibTeX RDF |
|
1 | Reijo M. Savola, Petri Heinonen |
Security-Measurability-Enhancing Mechanisms for a Distributed Adaptive Security Monitoring System. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Cynthia Y. Lester |
Shifting the Paradigm: Training Undergraduate Students in Software Security. |
SECURWARE |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Wilson Goudalo, Dominique Seret |
The Process of Engineering of Security of Information Systems (ESIS): The Formalism of Business Processes. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Engineering Process, Information Systems Security Engineering, Business Process Formalism, Information Systems Urbanization, UML, Enterprise Architecture |
1 | Reijo Savola, Habtamu Abie |
Identification of Basic Measurable Security Components for a Distributed Messaging System. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
security requirements, security metrics, messaging systems |
1 | Hossein Rezaei Ghaleh, Shahin Norouzi |
A New Approach to Protect the OS from Off-line Attacks Using the Smart Card. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
OS security, off-line attack, trusted computing, smartcard |
1 | Cynthia Y. Lester, Frank Jamerson |
Incorporating Software Security into an Undergraduate Software Engineering Course. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
secure software development lifecycle, software engineering, Collaborative learning, software security, undergraduate curriculum |
1 | Mohamed Abo El-Fotouh, Klaus Diepold |
The Pushdown Attack on AES. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Pushdown Attacks, Cryptanalysis, AES |
1 | Antonietta Stango, Neeli R. Prasad, Dimitris M. Kyriazanos |
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
vulnerabilities, security metrics, assets, threat analysis |
1 | Kamil Reddy, Hein S. Venter |
Using Object-Oriented Concepts to Develop a High-Level Information Privacy Risk Management Model. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Aleksander Dikanski, Christian Emig, Sebastian Abeck |
Integration of a Security Product in Service-Oriented Architecture. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Stefan Kraxberger, Udo Payer |
Secure Routing Approach for Unstructured P2P Systems. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
security, p2p systems, secure routing |
1 | Gábor György Gulyás, Róbert Schulcz, Sándor Imre |
Modeling Role-Based Privacy in Social Networking Services. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
privacy, social networks, Anonymity, identity management |
1 | Wei Zhou, Zhiqiang Wei 0001, Mijun Kang, Paddy Nixon, Lang Jia |
A Credit-Based Incentive Mechanism for Recommendation Acquisition in Multihop Mobile Ad Hoc Networks. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Heiko Klarl, Korbinian Molitorisz, Christian Emig, Karsten Klinger, Sebastian Abeck |
Extending Role-Based Access Control for Business Usage. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Access Control, RBAC, Business Process Modelling, Roles, Identity Management, Business-IT Alignment |
1 | Ángel Cuevas, Paul El Khoury, Laurent Gomez, Annett Laube, Alessandro Sorniotti |
A Security Pattern for Untraceable Secret Handshakes. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Christian Seifert, Peter Komisarczuk, Ian Welch |
True Positive Cost Curve: A Cost-Based Evaluation Method for High-Interaction Client Honeypots. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
client honeypot, security, evaluation, intrusion detection |
1 | Khaled Gaaloul, Philip Miseldine, François Charoy |
Towards Proactive Policies Supporting Event-Based Task Delegation. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Access Control, Workflow, Policy, Delegation |
1 | Jérémy Briffaut, Xavier Kauffmann-Tourkestansky, Jean-François Lalande, Waleed W. Smari |
Generation of Role Based Access Control Security Policies for Java Collaborative Applications. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
java, RBAC, collaborative applications |
1 | Rüdiger Grimm |
A Formal IT-Security Model for a Weak Fair-Exchange Cooperation with Non-repudiation Proofs. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
IT-security model, secure state, trust model, non-repudiation, fair exchange, obligation, transition rule |
1 | Su Chang, Thomas E. Daniels |
Correlation Based Node Behavior Profiling for Enterprise Network Security. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Security, Behavior Profiling |
1 | Vicente Hernández, Lourdes López-Santidrián, Oscar Prieto, José-Fernán Martínez, Ana Belén García, Antonio da Silva 0001 |
Security Framework for DPWS Compliant Devices. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Secure Protocols, WS Security, Security Framework, DPWS |
1 | Rainer Falk, Andreas Koepf, Hermann Seuschek, Ming-Yuh Huang, Mingyan Li |
Simulating a Multi-domain RFID System for Replacement Part Tracking. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Zahoor Ahmad Jhat, Ajaz Hussain Mir, Simeen Rubab |
Fingerprint Texture Feature for Discrimination and Personal Verification. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
spatial grey level dependence method, verification, Biometric, texture, fingerprint |
1 | Davide Lorenzoli, George Spanoudakis |
Detection of Security and Dependability Threats: A Belief Based Reasoning Approach. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
security and dependability, belief based reasoning, runtime monitoring |
1 | Gh. Rasool Begh, Ajaz Hussain Mir |
Quantification of the Effect of Security on Performance in Wireless LANs. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Wireless LAN, TCP, Packet Loss, UDP, WEP, WPA |
1 | Nuno Amálio |
Suspicion-Driven Formal Analysis of Security Requirements. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Security, planning, requirements, confidentiality, formal analysis, separation of duty, Event-Calculus |
1 | Manabu Hirano, Takahiro Shinagawa, Hideki Eiraku, Shoichi Hasegawa, Kazumasa Omote, Kouichi Tanimoto, Takashi Horie, Seiji Mune, Kazuhiko Kato, Takeshi Okuda, Eiji Kawai, Suguru Yamaguchi |
A Two-Step Execution Mechanism for Thin Secure Hypervisors. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
TCB, ID management, Security, Virtual machine monitor, Hypervisor, Trusted Computing Base, VMM |
1 | Catalin V. Bîrjoveanu |
Secrecy for Bounded Security Protocols without Freshness Check. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Masaru Takesue |
Personalized Filtering of Polymorphic E-mail Spam. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Personalized filter, polymorphous spam, filtering metric, fingerprint, Bloom filter, piecewise linear function |
1 | Rainer Falk, Wilson Goudalo, Eric Y. Chen, Reijo Savola, Manuela Popescu (eds.) |
The Third International Conference on Emerging Security Information, Systems and Technologies, SECURWARE 2009, 18-23 June 2009, Athens/Glyfada, Greece |
SECURWARE |
2009 |
DBLP BibTeX RDF |
|
1 | Igor Podebrad, Klaus Hildebrandt, Bernd Klauer |
List of Criteria for a Secure Computer Architecture. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
parts of von-Neumann- Maschine, computer-architecture, IT-security |
1 | Matti Mantere, Ilkka Uusitalo, Juha Röning |
Comparison of Static Code Analysis Tools. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Peipei Shi, Bo Zhu, Amr M. Youssef |
A PIN Entry Scheme Resistant to Recording-Based Shoulder-Surfing. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Secure PIN entry, shoulder surfing |
1 | Benjamin Aziz, Geoff W. Hamilton |
Detecting Man-in-the-Middle Attacks by Precise Timing. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Timed Algebra, Security, Static Analysis, Process Algebra |
1 | Peter Lory |
Secure Distributed Multiplication of Two Polynomially Shared Values: Enhancing the Efficiency of the Protocol. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
multiplication protocol, secret sharing, Multiparty computations, divided differences |
1 | Hyangjin Lee, Inkyoung Jeun, Hyuncheol Jung |
Criteria for Evaluating the Privacy Protection Level of Identity Management Services. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Privacy protection level, Assessment, Identity Management |
1 | Wolfgang Boehmer |
Survivability and Business Continuity Management System According to BS 25999. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
BS 25999, BCMS, Business Continuity Plan (BCP), Disaster Recovery (DR) |
1 | Alireza Sadighian, Rasool Jalili |
AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID Systems. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Bertrand Anckaert, Mariusz H. Jakubowski, Ramarathnam Venkatesan, Chit Wei Saw |
Runtime Protection via Dataflow Flattening. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
security, data hiding, obfuscation, software protection |
1 | Jan Nagy, Peter Pecho |
Social Networks Security. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
security, privacy, social networks |
1 | Marianne Azer, Sherif El-Kassas, Magdy S. El-Soudani |
Security in Ad Hoc Networks: From Vulnerability to Risk Management. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
ad hoc networks, attacks, vulnerabilities, security measures |
1 | Rainer Falk, Hans-Joachim Hof |
Fighting Insomnia: A Secure Wake-Up Scheme for Wireless Sensor Networks. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
wake-up radio, security, wireless sensor network |
1 | Mauro Migliardi, Valentina Resaz |
Distributed Intrusion Detection: Simulation and Evaluation of Two Methodologies. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Distributed Intrusion Detection., Simulation, Evaluation |
1 | Vasileios Karyotis, Anastasios Kakalis, Symeon Papavassiliou |
On the Tradeoff between MAC-Layer and Network-Layer Topology-Controlled Malware Spreading Schemes in Ad Hoc and Sensor Networks. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
malware spreading, topology control attacks, closed queuing networks |
1 | Bogdan Groza |
Analysis of a Password Strengthening Technique and Its Practical Use. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
authentication, protocol, password |
1 | Ilkka Uusitalo, Josep M. Catot, Ramon Loureiro |
Phishing and Countermeasures in Spanish Online Banking. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Abuse and crime involving computers, Security, Authentication, Electronic commerce, Invasive software |
1 | Maryam Feily, Alireza Shahrestani, Sureswaran Ramadass |
A Survey of Botnet and Botnet Detection. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Cristian Varas, Thomas Hirsch |
Self Protection through Collaboration Using D-CAF: A Distributed Context-Aware Firewall. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Participative Measurement, Denial of Service, Autonomic Communication, Intrusion Prevention, Flash crowds |
1 | Imad M. Abbadi, Muntaha Alawneh |
Replay Attack of Dynamic Rights within an Authorised Domain. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Enterprise Rights Management, Dynamic Rights, Authorised Domain, Digital Rights Management |
1 | Hyewon Park, Zeen Kim, Kwangjo Kim |
Forward Secure ID-Based Group Key Agreement Protocol with Anonymity. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
GKA, anonymous, forward-secure, ID-based |
1 | Mucahit Mutlugun, Ibrahim Sogukpinar |
Multi-level Authentication Scheme Utilizing Smart Cards and Biometrics. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
smart card, fingerprint, security policy, remote authentication |
1 | Mario Ibáñez, Natividad Martínez Madrid, Ralf Seepold |
Security Management with Virtual Gateway Platforms. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
Security architecure, Virtualization, Residential Gateway |
1 | Jérémy Briffaut, Jean-François Lalande, Christian Toinard, Mathieu Blanc |
Enforcement of Security Properties for Dynamic MAC Policies. |
SECURWARE |
2009 |
DBLP DOI BibTeX RDF |
|
1 | Wolfgang Boehmer |
Appraisal of the Effectiveness and Efficiency of an Information Security Management System Based on ISO 27001. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Katarzyna Michalska, Tomasz Walkowiak |
Hierarchical Approach to Dependability Analysis of Information Systems by Modeling and Simulation. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|
1 | Jérémy Briffaut, Jean-François Lalande, Waleed W. Smari |
Team--Based MAC Policy over Security--Enhanced Linux. |
SECURWARE |
2008 |
DBLP DOI BibTeX RDF |
|