Sciweavers

14824 search results - page 108 / 2965
» Security - Introduction
Sort
View
72
Voted
IEEEARES
2008
IEEE
15 years 9 months ago
Extending Mixed Serialisation Graphs to Replicated Environments
Josep M. Bernabé-Gisbert, Francesc D. Mu&nt...
IEEEARES
2008
IEEE
15 years 9 months ago
Symmetric Active/Active Replication for Dependent Services
Christian Engelmann, Stephen L. Scott, Chokchai Le...
SP
2008
IEEE
15 years 9 months ago
Thinking Inside the Box: System-Level Failures of Tamper Proofing
Saar Drimer, Steven J. Murdoch, Ross J. Anderson
88
Voted
ACSAC
2007
IEEE
15 years 8 months ago
Combining Static and Dynamic Analysis for Automatic Identification of Precise Access-Control Policies
Paolina Centonze, Robert J. Flynn, Marco Pistoia
92
Voted
CSFW
2007
IEEE
15 years 8 months ago
Design and Semantics of a Decentralized Authorization Language
Moritz Y. Becker, Cédric Fournet, Andrew D....