Sciweavers

5119 search results - page 134 / 1024
» Security Privacy
Sort
View
66
Voted
CCS
2007
ACM
15 years 10 months ago
Security policy analysis using deductive spreadsheets
Anu Singh, C. R. Ramakrishnan, I. V. Ramakrishnan,...
86
Voted
ISI
2007
Springer
15 years 10 months ago
Geospatial Data Mining for National Security: Land Cover Classification and Semantic Grouping
Chuanjun Li, Latifur Khan, Bhavani M. Thuraisingha...
XMLSEC
2003
ACM
15 years 9 months ago
An XML-based approach to combine firewalls and web services security specifications
Marco Cremonini, Sabrina De Capitani di Vimercati,...
86
Voted
CCS
2003
ACM
15 years 9 months ago
Fast automatic synthesis of security protocols using backward search
Ò ÙØÓÑ Ø × ÙÖ ØÝ ÔÖÓØÓ ÓÐ Ò Ö ØÓÖ × ÔÖÓÔÓ× Ø Ø Ù× × ÐÓ ¹ × ×ÝÒØ × × ÖÙÐ × ØÓ Ù Ø Ò Û Ö × Ö ÓÖ ×Ù Ø Ð ÔÖÓØÓ Ó...
Hongbin Zhou, Simon N. Foley