-
5
-
-
84885906962
-
Ipsecvalidate - A tool to validate ipsec configurations
-
R. Sailer, A. Acharya, M. Beigi, R. Jennings, and D. Verma. Ipsecvalidate - a tool to validate ipsec configurations. Proceedings of the Fifteenth Systems Administration Conference (LISA XV) (USENIX Association: Berkeley, CA), page 19, 2001.
-
(2001)
Proceedings of the Fifteenth Systems Administration Conference (LISA XV) (USENIX Association: Berkeley, CA)
, pp. 19
-
-
Sailer, R.1
Acharya, A.2
Beigi, M.3
Jennings, R.4
Verma, D.5
-
7
-
-
0242523147
-
On the theory of system administration
-
M. Burgess. On the theory of system administration. Science of Computer Programming, 49:1, 2003.
-
(2003)
Science of Computer Programming
, vol.49
, pp. 1
-
-
Burgess, M.1
-
9
-
-
2442625568
-
Cfengine's immunity model of evolving configuration management
-
M. Burgess. Cfengine's immunity model of evolving configuration management. Science of Computer Programming, 51:197, 2004.
-
(2004)
Science of Computer Programming
, vol.51
, pp. 197
-
-
Burgess, M.1
-
10
-
-
0029311990
-
A site configuration engine
-
MIT Press; Cambridge MA
-
M. Burgess, A site configuration engine. Computing systems (MIT Press; Cambridge MA), 8:309, 1995.
-
(1995)
Computing Systems
, vol.8
, pp. 309
-
-
Burgess, M.1
-
14
-
-
0019548112
-
Formal models of capability-based protection systems
-
L. Snyder. Formal models of capability-based protection systems. IEEE Transactions on Computers, 30:172, 1981.
-
(1981)
IEEE Transactions on Computers
, vol.30
, pp. 172
-
-
Snyder, L.1
-
16
-
-
84884841256
-
Archipelago: A network security analysis tool
-
San Diego, California, USA, October
-
Tuva Hassel Stang, Fahimeh Pourbayat, Mark Burgess, Geoffrey Canright, Kenth Engø, and Åsmund Weltzien. Archipelago: A network security analysis tool. In Proceedings of The 17th Annual Large Installation Systems Administration Conference (LISA 2003), San Diego, California, USA, October 2003.
-
(2003)
Proceedings of the 17th Annual Large Installation Systems Administration Conference (LISA 2003)
-
-
Stang, T.H.1
Pourbayat, F.2
Burgess, M.3
Canright, G.4
Engø, K.5
Weltzien, Å.6
-
17
-
-
4444346465
-
A natural definition of clusters and roles in undirected graphs
-
G. Canright and K. Engø-Monsen. A natural definition of clusters and roles in undirected graphs. Science of Computer Programming, 53:195, 2004.
-
(2004)
Science of Computer Programming
, vol.53
, pp. 195
-
-
Canright, G.1
Engø-Monsen, K.2
-
18
-
-
30344459012
-
A graph theoretical model of computer security: From file access to social engineering
-
M. Burgess, G. Canright, and K. Engø. A graph theoretical model of computer security: from file access to social engineering. International Journal of Information Security, 3:70-85, 2004.
-
(2004)
International Journal of Information Security
, vol.3
, pp. 70-85
-
-
Burgess, M.1
Canright, G.2
Engø, K.3
-
19
-
-
33646744104
-
A flexible method for information system security policy specifications
-
R. Ortalo. A flexible method for information system security policy specifications, Lecture Notes on Computer Science, 1485:67-85, 1998.
-
(1998)
Lecture Notes on Computer Science
, vol.1485
, pp. 67-85
-
-
Ortalo, R.1
-
23
-
-
0007827010
-
Dyadic: Deontic logic and contrary-to-duty obligations
-
Defeasible Deontic logic: Essays in Nonmonotonic Normative Reasoning. Kluwer Academic Publisher
-
H. Prakken and M. Sergot. Dyadic: deontic logic and contrary-to-duty obligations. In Defeasible Deontic logic: Essays in Nonmonotonic Normative Reasoning, volume 263 of Synthese library. Kluwer Academic Publisher, 1997.
-
(1997)
Synthese Library
, vol.263
-
-
Prakken, H.1
Sergot, M.2
-
24
-
-
0001972488
-
Semantical considerations in modal logic
-
S.A. Kripke. Semantical considerations in modal logic. Acta Philosophica Fenica, 16:83-94, 1963.
-
(1963)
Acta Philosophica Fenica
, vol.16
, pp. 83-94
-
-
Kripke, S.A.1
|