메뉴 건너뛰기




Volumn 3701 LNCS, Issue , 2005, Pages 97-112

Checking risky events is enough for local policies

Author keywords

[No Author keywords available]

Indexed keywords

APPROXIMATION THEORY; CONSTRAINT THEORY; DYNAMIC PROGRAMMING; FINITE AUTOMATA; PARAMETER ESTIMATION; SECURITY SYSTEMS;

EID: 33646177666     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11560586_9     Document Type: Conference Paper
Times cited : (5)

References (21)
  • 6
    • 0021870594 scopus 로고
    • Algebra of communicating processes with abstraction
    • J. A. Bergstra and J. W. Klop. Algebra of communicating processes with abstraction. Theoretical Computer Science, 37:77-121, 1985.
    • (1985) Theoretical Computer Science , vol.37 , pp. 77-121
    • Bergstra, J.A.1    Klop, J.W.2
  • 14
    • 49049126479 scopus 로고
    • Results on the propositional μ-calculus
    • D. Kozen. Results on the propositional μ-calculus. Theoretical Computer Science, 27:333-354, 1983.
    • (1983) Theoretical Computer Science , vol.27 , pp. 333-354
    • Kozen, D.1
  • 18
    • 0037272061 scopus 로고    scopus 로고
    • Secure composition of untrusted code: Box-π, wrappers and causality types
    • P. Sewell and J. Vitek. Secure composition of untrusted code: box-π, wrappers and causality types. Journal of Computer Security, 11(2), 2003.
    • (2003) Journal of Computer Security , vol.11 , Issue.2
    • Sewell, P.1    Vitek, J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.