


default search action
FOSAD 2006/2007
- Alessandro Aldini
, Roberto Gorrieri
:
Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science 4677, Springer 2007, ISBN 978-3-540-74809-0 - Martín Abadi:
Security Protocols: Principles and Calculi. 1-23 - Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari
, Roberto Zunino
:
Secure Service Orchestration. 24-74 - Daniel Le Métayer:
IT Security Analysis Best Practices and Formal Approaches. 75-91 - Úlfar Erlingsson:
Low-Level Software Security: Attacks and Defenses. 92-134 - Fabio Martinelli, Paolo Mori:
Enhancing Java Security with History Based Access Control. 135-159 - Javier López, Cristina Alcaraz, Rodrigo Roman:
On the Protection and Technologies of Critical Information Infrastructures. 160-182 - Liqun Chen
:
An Interpretation of Identity-Based Cryptography. 183-208 - Audun Jøsang
:
Trust and Reputation Systems. 209-245 - Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough:
An Introduction to the Role Based Trust Management Framework RT. 246-281 - Eimear Gallery, Chris J. Mitchell
:
Trusted Mobile Platforms. 282-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.