메뉴 건너뛰기




Volumn , Issue , 2000, Pages 141-150

Conduit cascades and secure synchronization

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER SOFTWARE; DATABASE SYSTEMS; SECURITY OF DATA; SYNCHRONIZATION; WEB BROWSERS;

EID: 0034593169     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/366173.366205     Document Type: Conference Paper
Times cited : (8)

References (14)
  • 2
    • 0026913667 scopus 로고
    • Symbolic boolean manipulation with ordered binary decision diagrams
    • R.E. Bryant. Symbolic boolean manipulation with ordered binary decision diagrams. ACM Computing Surveys, 1992.
    • (1992) ACM Computing Surveys
    • Bryant, R.E.1
  • 4
    • 0027559721 scopus 로고
    • A shortest path network security model
    • J.A. Fitch and L.J. Hoffman. A shortest path network security model. Computers and Security, 12:169-189, 1993.
    • (1993) Computers and Security , vol.12 , pp. 169-189
    • Fitch, J.A.1    Hoffman, L.J.2
  • 5
    • 0030680628 scopus 로고    scopus 로고
    • The specification and implementation of commercial security requirements including dynamic segregation of duties
    • ACM Press
    • S.N. Foley. The specification and implementation of commercial security requirements including dynamic segregation of duties. In 4th ACM Conference on Computer and Communications Security. ACM Press, 1997.
    • (1997) 4th ACM Conference on Computer and Communications Security
    • Foley, S.N.1
  • 7
    • 0027969913 scopus 로고
    • The complexity and composability of secure interoperation
    • Oakland, CA, May. IEEE Computer Society Press
    • L. Gong and X. Qian. The complexity and composability of secure interoperation. In Proceedings of the Symposium on Security and Privacy, pages 190-200, Oakland, CA, May 1994. IEEE Computer Society Press.
    • (1994) Proceedings of the Symposium on Security and Privacy , pp. 190-200
    • Gong, L.1    Qian, X.2
  • 8
    • 0032045587 scopus 로고    scopus 로고
    • The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction
    • S. Gritalis and D. Spinellis. The cascade vulnerability problem: The detection problem and a simulated annealing approach to its correction. Microprocessors and Microsystems, 21(10):621-628, 1998.
    • (1998) Microprocessors and Microsystems , vol.21 , Issue.10 , pp. 621-628
    • Gritalis, S.1    Spinellis, D.2
  • 9
    • 84974751467 scopus 로고
    • The cascade vulnerability problem
    • R.J. Horton et al. The cascade vulnerability problem. Journal of Computer Security, 2(4):279-290, 1993.
    • (1993) Journal of Computer Security , vol.2 , Issue.4 , pp. 279-290
    • Horton, R.J.1
  • 14
    • 0013192144 scopus 로고
    • Series in computer science
    • Prentice Hall International, second edition
    • J.M. Spivey. The Z Notation: A Reference Manual. Series in Computer Science. Prentice Hall International, second edition, 1992.
    • (1992) The Z Notation: A Reference Manual
    • Spivey, J.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.