Sciweavers

14824 search results - page 100 / 2965
» Security - Introduction
Sort
View
CCS
2001
ACM
15 years 6 months ago
A Chinese wall security model for decentralized workflow systems
Keywords
Vijayalakshmi Atluri, Soon Ae Chun, Pietro Mazzole...
CCS
2008
ACM
15 years 4 months ago
Trust management for secure information flows
Mudhakar Srivatsa, Shane Balfe, Kenneth G. Paterso...
CCS
2008
ACM
15 years 4 months ago
Secure control of portable images in a virtual computing utility
Ionut Constandache, Aydan R. Yumerefendi, Jeffrey ...
CCS
2006
ACM
15 years 4 months ago
Vulnerability analysis For evaluating quality of protection of security policies
Muhammad Abedin, Syeda Nessa, Ehab Al-Shaer, Latif...
CRISIS
2008
15 years 4 months ago
Formal procedural security modeling and analysis
We are involved in a project related to the evaluation
Komminist Weldemariam, Adolfo Villafiorita