Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
3811
search results - page 36 / 763
»
The Safe-Tcl Security Model
Sort
relevance
views
votes
recent
update
View
thumb
title
167
click to vote
CCS
2010
ACM
450
views
Security Privacy
»
more
CCS 2010
»
Secure provenance: the essential of bread and butter of data forensics in cloud computing
15 years 10 months ago
Download
bbcr.uwaterloo.ca
Secure provenance that records ownership and process history of data objects is vital to the success of data forensics in cloud computing, yet it is still a challenging issue toda...
Rongxing Lu, Xiaodong Lin, Xiaohui Liang, Xuemin (...
claim paper
Read More »
124
click to vote
SP
1990
IEEE
92
views
Security Privacy
»
more
SP 1990
»
Security Models and Information Flow
15 years 8 months ago
Download
www.cs.cornell.edu
John McLean
claim paper
Read More »
89
click to vote
CRITIS
2006
80
views
Security Privacy
»
more
CRITIS 2006
»
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
15 years 7 months ago
Download
www.isac.uma.es
Roland Rieke
claim paper
Read More »
94
Voted
SP
1987
IEEE
44
views
Security Privacy
»
more
SP 1987
»
Reasoning About Security Models
15 years 7 months ago
Download
www.cs.purdue.edu
John McLean
claim paper
Read More »
100
click to vote
CRITIS
2008
74
views
Security Privacy
»
more
CRITIS 2008
»
Critical Infrastructures Security Modeling, Enforcement and Runtime Checking
15 years 5 months ago
Download
critis08.dia.uniroma3.it
Anas Abou El Kalam, Yves Deswarte
claim paper
Read More »
« Prev
« First
page 36 / 763
Last »
Next »