The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ESORICS"( http://dblp.L3S.de/Venues/ESORICS )

URL (DBLP): http://dblp.uni-trier.de/db/conf/esorics

Publication years (Num. hits)
1990 (25) 1992 (25) 1994 (27) 1996 (24) 1998 (25) 2000 (20) 2002 (17) 2003 (20) 2004 (28) 2005 (29) 2006 (33) 2007 (41) 2008 (38) 2009 (43) 2010 (43) 2011 (37) 2012 (51) 2013 (44)
Publication types (Num. hits)
inproceedings(552) proceedings(18)
Venues (Conferences, Journals, ...)
ESORICS(570)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 311 occurrences of 214 keywords

Results
Found 570 publication records. Showing 570 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Michael Backes 0001, Markus Dürmuth, Dennis Hofheinz, Ralf Küsters Conditional Reactive Simulatability. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Xibin Zhao, Kwok-Yan Lam, Guiming Luo, Siu Leung Chung, Ming Gu 0001 Minimal Threshold Closure. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Threshold Closure, Access Control, Authorization, Threshold Schemes
1Peter Y. A. Ryan, Steve A. Schneider Prêt à Voter with Re-encryption Mixes. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann, Michael Waidner Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dusko Pavlovic, Catherine Meadows 0001 Deriving Secrecy in Key Establishment Protocols. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Daniel Mellado, Eduardo Fernández-Medina, Mario Piattini Applying a Security Requirements Engineering Process. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jing Wang, Yoshiaki Takata, Hiroyuki Seki HBAC: A Model for History-Based Access Control and Its Model Checking. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia Analysis of Policy Anomalies on Distributed Network Security Setups. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Shuhong Wang 0001, Xuhua Ding, Robert H. Deng, Feng Bao 0001 Private Information Retrieval Using Trusted Hardware. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Philip W. L. Fong Discretionary Capability Confinement. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Hao Wang, Somesh Jha, Thomas W. Reps, Stefan Schwoon, Stuart G. Stubblebine Reducing the Dependence of SPKI/SDSI on PKI. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Vitaly Shmatikov, Ming-Hsiu Wang Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Gabriel Maciá-Fernández, Jesús Esteban Díaz Verdejo, Pedro Garcia-Teodoro Assessment of a Vulnerability in Iterative Servers Enabling Low-Rate DoS Attacks. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Christian Cachin, Alina Oprea Secure Key-Updating for Lazy Revocation. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Yuji Watanabe, Sachiko Yoshihama, Takuya Mishina, Michiharu Kudo, Hiroshi Maruyama Bridging the Gap Between Inter-communication Boundary and Internal Trusted Components. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Mudhakar Srivatsa, Ling Liu 0001 Key Derivation Algorithms for Monotone Access Structures in Cryptographic File Systems. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Milan Fort, Felix C. Freiling, Lucia Draque Penso, Zinaida Benenson, Dogan Kesdogan TrustedPals: Secure Multiparty Computation Implemented with Smart Cards. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Thomas Santen A Formal Framework for Confidentiality-Preserving Refinement. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Jason Crampton, Hemanth Khambhammettu Delegation in Role-Based Access Control. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Alex Hai Wang, Peng Liu 0005 Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Zhiqiang Yang, Sheng Zhong 0002, Rebecca N. Wright Privacy-Preserving Queries on Encrypted Data. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Cheun Ngen Chong, Sorin M. Iacob, R. Paul Koster, Javier Montaner, René van Buuren License Transfer in OMA-DRM. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Dieter Gollmann, Jan Meier, Andrei Sabelfeld (eds.) Computer Security - ESORICS 2006, 11th European Symposium on Research in Computer Security, Hamburg, Germany, September 18-20, 2006, Proceedings Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Deepak Garg 0001, Lujo Bauer, Kevin D. Bowers, Frank Pfenning, Michael K. Reiter A Linear Logic of Authorization and Knowledge. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Iliano Cervesato, Aaron D. Jaggard, Andre Scedrov, Joe-Kai Tsay Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Martin Johns SessionSafe: Implementing XSS Immune Session Handling. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Boris Köpf, David A. Basin Timing-Sensitive Information Flow Analysis for Synchronous Systems. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Michael P. Collins, Michael K. Reiter Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1David A. Naumann From Coupling Relations to Mated Invariants for Checking Information Flow. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Abdellatif Benjelloun Touimi, Jean-Bernard Fischer, Caroline Fontaine, Christophe Giraud 0001, Michel Milhau Enhanced Security Architecture for Music Distribution on Mobile. Search on Bibsonomy ESORICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF OMA DRM, mobile, cryptography, watermarking, audio, Content distribution, smartcard, digital rights management (DRM)
1Vijayalakshmi Atluri, Qi Guo Unified Index for Mobile Object Data and Authorizations. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Giuseppe Ateniese, Daniel H. Chou, Breno de Medeiros, Gene Tsudik Sanitizable Signatures. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Karsten Sohr, Gail-Joon Ahn, Martin Gogolla, Lars Migge Specification and Validation of Authorisation Constraints Using UML and OCL. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sabrina De Capitani di Vimercati, Paul F. Syverson, Dieter Gollmann (eds.) Computer Security - ESORICS 2005, 10th European Symposium on Research in Computer Security, Milan, Italy, September 12-14, 2005, Proceedings Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Pedro Adão, Gergei Bana, Jonathan Herzog, Andre Scedrov Soundness of Formal Encryption in the Presence of Key-Cycles. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1George Danezis, Chris Lesniewski-Laas, M. Frans Kaashoek, Ross J. Anderson Sybil-Resistant DHT Routing. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Huafei Zhu, Feng Bao 0001 Augmented Oblivious Polynomial Evaluation Protocol and Its Applications. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Augmented oblivious polynomial evaluation, homomorphic commitment scheme, homomorphic public key encryption
1Indrajit Ray, Nayot Poolsapassit Using Attack Trees to Identify Malicious Attacks from Authorized Insiders. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Jay Ligatti, Lujo Bauer, David Walker 0001 Enforcing Non-safety Security Policies with Program Monitors. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Marcin Gogolewski, Marek Klonowski, Miroslaw Kutylowski Local View Attack on Anonymous Communication. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Manuel Hilty, David A. Basin, Alexander Pretschner On Obligations. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001 Quantifying Probabilistic Information Flow in Computational Reactive Systems. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1David Chaum, Peter Y. A. Ryan, Steve A. Schneider A Practical Voter-Verifiable Election Scheme. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1João Porto de Albuquerque, Heiko Krumm, Paulo Lício de Geus On Scalability and Modularisation in the Modelling of Network Security Systems. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Fabio Massacci, John Mylopoulos, Nicola Zannone Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Barbara Simons Computerized Voting Machines: A View from the Trenches. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Aslan Askarov, Andrei Sabelfeld Security-Typed Languages for Implementation of Cryptographic Protocols: A Case Study. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sigrid Gürgens, Peter Ochsenschläger, Carsten Rudolph Abstractions Preserving Parameter Confidentiality. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Rajeev Gupta, Manish Bhide A Generic XACML Based Declarative Authorization Scheme for Java. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Thomas Groß 0001, Birgit Pfitzmann, Ahmad-Reza Sadeghi Browser Model for Security Analysis of Browser-Based Protocols. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Sabrina Tarento Machine-Checked Security Proofs of Cryptographic Signature Schemes. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Giovanni Di Crescenzo, Abhrajit Ghosh, Rajesh Talpade Towards a Theory of Intrusion Detection. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Lingyu Wang 0001, Anyi Liu, Sushil Jajodia An Efficient and Unified Approach to Correlating, Hypothesizing, and Predicting Intrusion Alerts. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Mariemma Inmaculada Yagüe del Valle, María-del-Mar Gallardo, Antonio Mana Semantic Access Control Model: A Formal Specification. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Formal Methods in security, Access Control, Authorization, Distributed Systems Security
1Naizhen Qi, Michiharu Kudo XML Access Control with Policy Matching Tree. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Somesh Jha, Louis Kruger, Patrick D. McDaniel Privacy Preserving Clustering. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Felix C. Freiling, Thorsten Holz, Georg Wicherski Botnet Tracking: Exploring a Root-Cause Methodology to Prevent Distributed Denial-of-Service Attacks. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Kristian Gjøsteen Security Notions for Disk Encryption. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann Limits of the Cryptographic Realization of Dolev-Yao-Style XOR. Search on Bibsonomy ESORICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
1Indrajit Ray, Sudip Chakraborty A Vector Model of Trust for Developing Trustworthy Systems. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1James Aspnes, Joan Feigenbaum, Aleksandr Yampolskiy, Sheng Zhong 0002 Towards a Theory of Data Entanglement: (Extended Abstract). Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Pierangela Samarati, Peter Y. A. Ryan, Dieter Gollmann, Refik Molva (eds.) Computer Security - ESORICS 2004, 9th European Symposium on Research Computer Security, Sophia Antipolis, France, September 13-15, 2004, Proceedings Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Mikhail J. Atallah, Marina Bykova Portable and Flexible Document Access Control Mechanisms. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1David von Oheimb Information Flow Control Revisited: Noninfluence = Noninterference + Nonleakage. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Bev Littlewood, Lorenzo Strigini Redundancy and Diversity in Security. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Rainer Böhme, Andreas Westfeld Breaking Cauchy Model-Based JPEG Steganography with First Order Statistics. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Michael J. Covington, Mustaque Ahamad, Irfan A. Essa, H. Venkateswaran Parameterized Authentication. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Naizhen Qi, Michiharu Kudo Access-Condition-Table-Driven Access Control for XML Databases. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Markus Dürmuth, Rainer Steinwandt An Algebra for Composing Enterprise Privacy Policies. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Dieter Hutter, Axel Schairer Possibilistic Information Flow Control in the Presence of Encrypted Communication. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Bodo Möller A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Sjouke Mauw, Jan Verschuren, Erik P. de Vink A Formalization of Anonymity and Onion Routing. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Julian B. Grizzard, John G. Levine, Henry L. Owen Re-establishing Trust in Compromised Systems: Recovering from Rootkits That Trojan the System Call Table. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001 A Cryptographically Sound Dolev-Yao Style Security Proof of the Otway-Rees Protocol. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1John McHugh Sets, Bags, and Rock and Roll: Analyzing Large Data Sets of Network Data. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Seyit Ahmet Çamtepe, Bülent Yener Combinatorial Design of Key Distribution Mechanisms for Wireless Sensor Networks. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jan Camenisch Better Privacy for Trusted Computing Platforms: (Extended Abstract). Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Xinzhou Qin, Wenke Lee Discovering Novel Attack Strategies from INFOSEC Alerts. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Jon A. Solworth, Robert H. Sloan Security Property Based Administrative Controls. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Claudia Díaz, Len Sassaman, Evelyne Dewitte Comparison Between Two Practical Mix Designs. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Shiping Chen 0003, Duminda Wijesekera, Sushil Jajodia Incorporating Dynamic Constraints in the Flexible Authorization Framework. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Catherine Meadows 0001, Dusko Pavlovic Deriving, Attacking and Defending the GDOI Protocol. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Einar Mykletun, Maithili Narasimha, Gene Tsudik Signature Bouquets: Immutability for Aggregated/Condensed Signatures. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Ramkumar Chinchani, Anusha Iyer, Bharat Jayaraman, Shambhu J. Upadhyaya ARCHERR: Runtime Environment Driven Program Safety. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Roberto Battistoni, Emanuele Gabrielli, Luigi V. Mancini A Host Intrusion Prevention System for Windows Operating Systems. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Claude Castelluccia, Gabriel Montenegro, Julien Laganier, Christoph Neumann 0001 Hindering Eavesdropping via IPv6 Opportunistic Encryption. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1Lars R. Knudsen, John Erik Mathiassen On the Role of Key Schedules in Attacks on Iterated Ciphers. Search on Bibsonomy ESORICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
1David von Oheimb, Georg Walter, Volkmar Lotz A Formal Security Model of the Infineon SLE 88 Smart Card Memory Managment. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Rogardt Heldal, Fredrik Hultin Bridging Model-Based and Language-Based Security. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Xuhui Ao, Naftaly H. Minsky Flexible Regulation of Distributed Coalitions. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Distributed coalition, Decentralized regulatory mechanism, Policy hierarchy, Policy interoperability, Security policy, Law-Governed Interaction
1Lingyu Wang 0001, Yingjiu Li, Duminda Wijesekera, Sushil Jajodia Precisely Answering Multi-dimensional Range Queries without Privacy Breaches. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Stefan Axelsson Visualisation for Intrusion Detection. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Marcin Gomulkiewicz, Marek Klonowski, Miroslaw Kutylowski Rapid Mixing and Security of Chaum's Visual Electronic Voting. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Yuji Watanabe, Masayuki Numao Multi-round Secure-Light Broadcast Exclusion Protocol with Pre-processing. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Christopher Krügel, Darren Mutz, Fredrik Valeur, Giovanni Vigna On the Detection of Anomalous System Call Arguments. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Einar Snekkenes, Dieter Gollmann (eds.) Computer Security - ESORICS 2003, 8th European Symposium on Research in Computer Security, Gjøvik, Norway, October 13-15, 2003, Proceedings Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Andrei Serjantov, Peter Sewell Passive Attack Analysis for Connection-Based Anonymity Systems. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Michael Backes 0001, Birgit Pfitzmann, Matthias Schunter A Toolkit for Managing Enterprise Privacy Policies. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
1Dulce Domingos, António Rito Silva, Pedro Veiga Authorization and Access Control in Adaptive Workflows. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF adaptive authorizations, Access control, adaptive workflow
1Adrian Baldwin, Simon Shiu Hardware Encapsulation of Security Services. Search on Bibsonomy ESORICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #301 - #400 of 570 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license