The SCEAS System
Navigation Menu

Conferences in DBLP

(crisis)
2008 (conf/crisis/2008)


  1. An algebraic-functional framework for distributed access control. [Citation Graph (, )][DBLP]


  2. Aspect-based enforcement of formal delegation policies. [Citation Graph (, )][DBLP]


  3. Access control for cooperative systems: A comparative analysis. [Citation Graph (, )][DBLP]


  4. An ontology-based approach to react to network attacks. [Citation Graph (, )][DBLP]


  5. Anomaly-based intrusion detection using distributed intelligent systems. [Citation Graph (, )][DBLP]


  6. Policy-based intrusion detection in Web applications by monitoring Java information flows. [Citation Graph (, )][DBLP]


  7. Efficient detection of DDoS attacks with important attributes. [Citation Graph (, )][DBLP]


  8. A formal security framework for mobile agent systems: Specification and verification. [Citation Graph (, )][DBLP]


  9. Verification of Workflow processes under multilevel security considerations. [Citation Graph (, )][DBLP]


  10. If only I can trust my police! SIM : An agent-based audit solution of access right deployment through open network. [Citation Graph (, )][DBLP]


  11. Security analysis of the Dependability, Security Reconfigurability framework. [Citation Graph (, )][DBLP]


  12. Analysis of Peer-to-Peer networks from a dependability perspective. [Citation Graph (, )][DBLP]


  13. A Byzantine solution to early detect massive attacks. [Citation Graph (, )][DBLP]


  14. Automated reaction based on risk analysis and attackers skills in intrusion detection systems. [Citation Graph (, )][DBLP]


  15. Towards a robust privacy and anonymity preserving architecture for ubiquitous computing. [Citation Graph (, )][DBLP]


  16. A comparative study of secret code variants in terms of keystroke dynamics. [Citation Graph (, )][DBLP]


  17. Reputation based clustering algorithm for security management in ad hoc networks with liars. [Citation Graph (, )][DBLP]


  18. Quality assurance of Grid service provisioning by risk aware managing of resource failures. [Citation Graph (, )][DBLP]


  19. EESP: A Security protocol that supports QoS management. [Citation Graph (, )][DBLP]


  20. Economic-based vs. nature-inspired intruder detection in sensor networks. [Citation Graph (, )][DBLP]


  21. Apport de la cryptographie elliptique dans le vote électronique. [Citation Graph (, )][DBLP]


  22. Application framework for high security requirements in R&D environments based on quantum cryptography. [Citation Graph (, )][DBLP]


  23. A new timestamping schema in the Bounded Storage Model. [Citation Graph (, )][DBLP]


  24. Extended UML activity diagram for composing Grid services workflows. [Citation Graph (, )][DBLP]


  25. Case study: Using digital signatures for the archival of medical records in hospitals. [Citation Graph (, )][DBLP]


  26. VisAA: Visual analyzer for assembler. [Citation Graph (, )][DBLP]


  27. Revisiting enforceable security policies. [Citation Graph (, )][DBLP]


  28. Firewalls anomalies' detection system based on web services / mobile agents interactions. [Citation Graph (, )][DBLP]


  29. Towards a new user Anonymity Preserving Protocol (APP) for MANETs. [Citation Graph (, )][DBLP]


  30. Formal procedural security modeling and analysis. [Citation Graph (, )][DBLP]


  31. A new covert channel in WIFI networks. [Citation Graph (, )][DBLP]


  32. Comparing Chord, CAN, and Pastry overlay networks for resistance to DoS attacks. [Citation Graph (, )][DBLP]


  33. Towards an automated firewall security policies validation process. [Citation Graph (, )][DBLP]

NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002