|
Conferences in DBLP
(crisis) 2008 (conf/crisis/2008)
An algebraic-functional framework for distributed access control. [Citation Graph (, )][DBLP]
Aspect-based enforcement of formal delegation policies. [Citation Graph (, )][DBLP]
Access control for cooperative systems: A comparative analysis. [Citation Graph (, )][DBLP]
An ontology-based approach to react to network attacks. [Citation Graph (, )][DBLP]
Anomaly-based intrusion detection using distributed intelligent systems. [Citation Graph (, )][DBLP]
Policy-based intrusion detection in Web applications by monitoring Java information flows. [Citation Graph (, )][DBLP]
Efficient detection of DDoS attacks with important attributes. [Citation Graph (, )][DBLP]
A formal security framework for mobile agent systems: Specification and verification. [Citation Graph (, )][DBLP]
Verification of Workflow processes under multilevel security considerations. [Citation Graph (, )][DBLP]
If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network. [Citation Graph (, )][DBLP]
Security analysis of the Dependability, Security Reconfigurability framework. [Citation Graph (, )][DBLP]
Analysis of Peer-to-Peer networks from a dependability perspective. [Citation Graph (, )][DBLP]
A Byzantine solution to early detect massive attacks. [Citation Graph (, )][DBLP]
Automated reaction based on risk analysis and attackers skills in intrusion detection systems. [Citation Graph (, )][DBLP]
Towards a robust privacy and anonymity preserving architecture for ubiquitous computing. [Citation Graph (, )][DBLP]
A comparative study of secret code variants in terms of keystroke dynamics. [Citation Graph (, )][DBLP]
Reputation based clustering algorithm for security management in ad hoc networks with liars. [Citation Graph (, )][DBLP]
Quality assurance of Grid service provisioning by risk aware managing of resource failures. [Citation Graph (, )][DBLP]
EESP: A Security protocol that supports QoS management. [Citation Graph (, )][DBLP]
Economic-based vs. nature-inspired intruder detection in sensor networks. [Citation Graph (, )][DBLP]
Apport de la cryptographie elliptique dans le vote électronique. [Citation Graph (, )][DBLP]
Application framework for high security requirements in R&D environments based on quantum cryptography. [Citation Graph (, )][DBLP]
A new timestamping schema in the Bounded Storage Model. [Citation Graph (, )][DBLP]
Extended UML activity diagram for composing Grid services workflows. [Citation Graph (, )][DBLP]
Case study: Using digital signatures for the archival of medical records in hospitals. [Citation Graph (, )][DBLP]
VisAA: Visual analyzer for assembler. [Citation Graph (, )][DBLP]
Revisiting enforceable security policies. [Citation Graph (, )][DBLP]
Firewalls anomalies' detection system based on web services / mobile agents interactions. [Citation Graph (, )][DBLP]
Towards a new user Anonymity Preserving Protocol (APP) for MANETs. [Citation Graph (, )][DBLP]
Formal procedural security modeling and analysis. [Citation Graph (, )][DBLP]
A new covert channel in WIFI networks. [Citation Graph (, )][DBLP]
Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacks. [Citation Graph (, )][DBLP]
Towards an automated firewall security policies validation process. [Citation Graph (, )][DBLP]
|