-
2
-
-
3042684934
-
An extensive comparison between OWA and OFNWA aggregation
-
Naples - Italy
-
Canfora G., Troiano L., "An Extensive Comparison between OWA and OFNWA Aggregation," VIII Sigef Congress, Naples - Italy.2001.
-
(2001)
VIII Sigef Congress
-
-
Canfora, G.1
Troiano, L.2
-
3
-
-
77953767451
-
The importance of dealing with uncertainty in the evaluation of software engineering methods and tools
-
ACM Press, Ischia, Italy
-
Canfora G. and Troiano L., The Importance of Dealing with Uncertainty in the Evaluation of Software Engineering Methods and Tools. SEKE 2002. ACM Press, Ischia, Italy. 691-698 (2002)
-
(2002)
SEKE 2002
, pp. 691-698
-
-
Canfora, G.1
Troiano, L.2
-
5
-
-
84904313967
-
Policy Formalization to combine separate systems into larger connected networks of trust
-
Paris, France
-
Casola V., Mazzeo A., Mazzocca N., Vittorini V., Policy Formalization to combine separate systems into larger connected networks of trust - Proceedings of NetCon'2002 Conference, Paris, France. 2002.
-
(2002)
Proceedings of NetCon'2002 Conference
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Vittorini, V.4
-
6
-
-
1542434940
-
Policy based interoperability in distributed security infrastructures
-
Madeira, Spain
-
Casola V., Mazzeo A., Mazzocca N., Vittorini V., Policy based interoperability in distributed security infrastructures -Proceedings of 10th ISPE International conference on concurrent engineering: research and applications. Madeira, Spain. 2003.
-
(2003)
Proceedings of 10th ISPE International Conference on Concurrent Engineering: Research and Applications
-
-
Casola, V.1
Mazzeo, A.2
Mazzocca, N.3
Vittorini, V.4
-
7
-
-
3042686499
-
Security level evaluation: Policy and fuzzy technique
-
Las Vegas, ISBN 0-7695-2108-8
-
Casola V., Preziosi R., Rak M., Troiano L. 2004. Security Level Evaluation: Policy and Fuzzy Technique. In IEEE Proceedings of International Conference on Information Technology: Coding and Computing (ITCC 2004), vol. 2, pp, 752-756, Las Vegas, ISBN 0-7695-2108-8.
-
(2004)
IEEE Proceedings of International Conference on Information Technology: Coding and Computing (ITCC 2004)
, vol.2
, pp. 752-756
-
-
Casola, V.1
Preziosi, R.2
Rak, M.3
Troiano, L.4
-
8
-
-
23844470859
-
A reference model for security level evaluation: Policy and fuzzy techniques
-
edited by Ajith Abraham, Oklahoma State University, USA and L.C. Jain, University of South Australia, January
-
Casola V., Preziosi R., Rak M., Troiano L., A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques, in JUCS - Journal of Universal Computer Science - edited by Ajith Abraham, Oklahoma State University, USA and L.C. Jain, University of South Australia, January 2005
-
(2005)
JUCS - Journal of Universal Computer Science
-
-
Casola, V.1
Preziosi, R.2
Rak, M.3
Troiano, L.4
-
12
-
-
23844517883
-
An approach to formally compare and query certification practice statements
-
Published Berlin
-
Grill S. An Approach to Formally Compare and Query Certification Practice Statements, Published on Informatik GI Workshop, Berlin 2000
-
(2000)
Informatik GI Workshop
-
-
Grill, S.1
-
14
-
-
0345580236
-
A Formalization and evaluation of certificate policies
-
Klobucar T., Jerman-Blazic B., A Formalization and evaluation of certificate policies, Computer Communication 22(1999), 1104-1110
-
(1999)
Computer Communication
, vol.22
, pp. 1104-1110
-
-
Klobucar, T.1
Jerman-Blazic, B.2
-
15
-
-
0034159709
-
Achieving Interoperability in a multiple-security-policies environment
-
Elsevier Science
-
Kokolakis S.A., Kiountouzis E.A., Achieving Interoperability in a multiple-security-policies environment, Computer & Security. Vol 19, no. 3 pp 267-281, Elsevier Science 2000.
-
(2000)
Computer & Security
, vol.19
, Issue.3
, pp. 267-281
-
-
Kokolakis, S.A.1
Kiountouzis, E.A.2
-
16
-
-
0030677524
-
A logical language for expressing authorizations
-
Published Oakland, USA
-
Jajodia S., Samarati P., and Subrahmanian V. S., "A Logical Language for Expressing Authorizations," Published in the proceedings of IEEE Symposium on Security and Privacy, Oakland, USA, 1997.
-
(1997)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Jajodia, S.1
Samarati, P.2
Subrahmanian, V.S.3
-
20
-
-
0003308762
-
Internet X.509 public key infrastructure certificate and CRL profile
-
RFC2459 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile. 1999.
-
(1999)
RFC2459
-
-
-
21
-
-
0003365059
-
Internet X.509 public key infrastructure certificate policy and certification practices framework
-
RFC 3647: Chokhani, S. & Ford, W., 1999. Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework.
-
(1999)
RFC
, vol.3647
-
-
Chokhani, S.1
Ford, W.2
|