


default search action
FOSAD 2006/2007
- Alessandro Aldini

, Roberto Gorrieri
:
Foundations of Security Analysis and Design IV, FOSAD 2006/2007 Tutorial Lectures. Lecture Notes in Computer Science 4677, Springer 2007, ISBN 978-3-540-74809-0 - Martín Abadi:

Security Protocols: Principles and Calculi. 1-23 - Massimo Bartoletti, Pierpaolo Degano, Gian-Luigi Ferrari

, Roberto Zunino
:
Secure Service Orchestration. 24-74 - Daniel Le Métayer:

IT Security Analysis Best Practices and Formal Approaches. 75-91 - Úlfar Erlingsson:

Low-Level Software Security: Attacks and Defenses. 92-134 - Fabio Martinelli, Paolo Mori:

Enhancing Java Security with History Based Access Control. 135-159 - Javier López, Cristina Alcaraz, Rodrigo Roman:

On the Protection and Technologies of Critical Information Infrastructures. 160-182 - Liqun Chen

:
An Interpretation of Identity-Based Cryptography. 183-208 - Audun Jøsang

:
Trust and Reputation Systems. 209-245 - Marcin Czenko, Sandro Etalle, Dongyi Li, William H. Winsborough:

An Introduction to the Role Based Trust Management Framework RT. 246-281 - Eimear Gallery, Chris J. Mitchell

:
Trusted Mobile Platforms. 282-323

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














