Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/ccs/ccs2004.bht:"
@inproceedings{DBLP:conf/ccs/BartheN04, author = {Gilles Barthe and Leonor Prensa Nieto}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Formally verifying information flow type systems for concurrent and thread systems}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {13--22}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029136}, doi = {10.1145/1029133.1029136}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BartheN04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BugliesiFM04, author = {Michele Bugliesi and Riccardo Focardi and Matteo Maffei}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Authenticity by tagging and typing}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {1--12}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029135}, doi = {10.1145/1029133.1029135}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BugliesiFM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/CorinEHM04, author = {Ricardo Corin and Sandro Etalle and Pieter H. Hartel and Angelika Mader}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Timed model checking of security protocols}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {23--32}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029137}, doi = {10.1145/1029133.1029137}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/CorinEHM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DoanDTK04, author = {Thuong Doan and Steven A. Demurjian and T. C. Ting and Andreas Ketterl}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {{MAC} and {UML} for secure software design}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {75--85}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029144}, doi = {10.1145/1029133.1029144}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DoanDTK04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/DungT04, author = {Phan Minh Dung and Phan Minh Thang}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Stepwise development of security protocols: a speech act-oriented approach}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {33--44}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029139}, doi = {10.1145/1029133.1029139}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/DungT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Hashii04, author = {Brant Hashii}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Lessons learned using alloy to formally specify {MLS-PCA} trusted security architecture}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {86--95}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029145}, doi = {10.1145/1029133.1029145}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Hashii04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/UribeC04, author = {Tom{\'{a}}s E. Uribe and Steven Cheung}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Automatic analysis of firewall and network intrusion detection system configurations}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {66--74}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029143}, doi = {10.1145/1029133.1029143}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/UribeC04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangWJ04, author = {Lingyu Wang and Duminda Wijesekera and Sushil Jajodia}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {A logic-based framework for attribute based access control}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {45--55}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029140}, doi = {10.1145/1029133.1029140}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangWJ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhangRG04, author = {Nan Zhang and Mark Ryan and Dimitar P. Guelev}, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Synthesising verified access control systems in {XACML}}, booktitle = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, pages = {56--65}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1029133.1029141}, doi = {10.1145/1029133.1029141}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhangRG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2004, editor = {Vijayalakshmi Atluri and Michael Backes and David A. Basin and Michael Waidner}, title = {Proceedings of the 2004 {ACM} Workshop on Formal Methods in Security Engineering, {FMSE} 2004, Washington, DC, USA, October 29, 2004}, publisher = {{ACM}}, year = {2004}, url = {http://dl.acm.org/citation.cfm?id=1030083}, isbn = {1-58113-971-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2004.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.