|
Conferences in DBLP
- Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenbaum
Support for multi-level security policies in DRM architectures. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:3-9 [Conf]
- Hongbin Zhou, Simon N. Foley
A collaborative approach to autonomic security protocols. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:13-21 [Conf]
- Gerard Allwein
A qualitative framework for Shannon information theories. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:23-31 [Conf]
- Steven J. Greenwald, Kenneth G. Olthoff, Victor Raskin, Willibald Ruch
The user non-acceptance paradigm: INFOSEC's dirty little secret. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:35-43 [Conf]
- Konstantin Beznosov, Philippe Kruchten
Towards agile security assurance. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:47-54 [Conf]
- Boris Dragovic, Jon Crowcroft
Information exposure control through data manipulation for ubiquitous computing. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:57-64 [Conf]
- Ahmad-Reza Sadeghi, Christian Stüble
Property-based attestation for computing platforms: caring about properties, not mechanisms. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:67-77 [Conf]
- Vivek Haldar, Michael Franz
Symmetric behavior-based trust: a new paradigm for internet computing. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:79-84 [Conf]
- Timothy Hollebeek, Rand Waltzman
The role of suspicion in model-based intrusion detection. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:87-94 [Conf]
- Scott Flinn, Steve Stoyles
Omnivore: risk management through bidirectional transparency. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:97-105 [Conf]
- Carrie Gates, Tara Whalen
Profiling the defenders. [Citation Graph (0, 0)][DBLP] NSPW, 2004, pp:107-114 [Conf]
|