Sciweavers

3504 search results - page 18 / 701
» Secure protocol composition
Sort
View
61
Voted
CCS
2003
ACM
15 years 2 months ago
A compositional framework for access control policies enforcement
François Siewe, Antonio Cau, Hussein Zedan
OOPSLA
2000
Springer
15 years 1 months ago
Exclusion for composite objects
James Noble, David Holmes, John Potter
SP
2002
IEEE
160views Security Privacy» more  SP 2002»
14 years 9 months ago
On the Composition of Secure Systems
When complex systems are constructed from simpler components it is important to know how properties of the components behave under composition. In this article, we present various...
Heiko Mantel