Sciweavers

49 search results - page 6 / 10
» acj 2006
Sort
View
ACJ
2006
47views more  ACJ 2006»
14 years 11 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...
ACJ
2006
86views more  ACJ 2006»
14 years 11 months ago
Analysing the Woo-Lam Protocol Using CSP and Rank Functions
Siraj A. Shaikh, Vicky J. Bush
ACJ
2006
105views more  ACJ 2006»
14 years 11 months ago
Return On Security Investment (ROSI) - A Practical Quantitative Modell
Wes Sonnenreich, Jason Albanese, Bruce Stout
ACJ
2006
57views more  ACJ 2006»
14 years 11 months ago
An Attribute-Based Delegation Model and Its Extension
Chunxiao Ye, Zhongfu Wu, Yunqing Fu
66
Voted
ACJ
2006
59views more  ACJ 2006»
14 years 11 months ago
Towards a Process for Web Services Security
Carlos Gutiérrez, Eduardo Fernández-...