Sciweavers

49 search results - page 6 / 10
» acj 2006
Sort
View
ACJ
2006
47views more  ACJ 2006»
13 years 7 months ago
Securing UML Information Flow Using FlowUML
Khaled Alghathbar, Csilla Farkas, Duminda Wijeseke...
ACJ
2006
86views more  ACJ 2006»
13 years 7 months ago
Analysing the Woo-Lam Protocol Using CSP and Rank Functions
Siraj A. Shaikh, Vicky J. Bush
ACJ
2006
105views more  ACJ 2006»
13 years 7 months ago
Return On Security Investment (ROSI) - A Practical Quantitative Modell
Wes Sonnenreich, Jason Albanese, Bruce Stout
ACJ
2006
57views more  ACJ 2006»
13 years 7 months ago
An Attribute-Based Delegation Model and Its Extension
Chunxiao Ye, Zhongfu Wu, Yunqing Fu
ACJ
2006
59views more  ACJ 2006»
13 years 7 months ago
Towards a Process for Web Services Security
Carlos Gutiérrez, Eduardo Fernández-...