-
2
-
-
3042601656
-
Protocol analysis in intrusion detection using decision tree
-
T. Abbes, A. Bouhoula, and M. Rusinowitch. Protocol analysis in intrusion detection using decision tree. In Proc. ITCC'04, pages 404-408, 2004.
-
(2004)
Proc. ITCC'04
, pp. 404-408
-
-
Abbes, T.1
Bouhoula, A.2
Rusinowitch, M.3
-
3
-
-
0037999031
-
A unified security mechanism for networked applications
-
J. Abendroth and C. Jensen. A unified security mechanism for networked applications. In SAC2003, pages 351-357, 2003.
-
(2003)
SAC2003
, pp. 351-357
-
-
Abendroth, J.1
Jensen, C.2
-
4
-
-
11244330759
-
Operational semantics for declarative multi-paradigm languages
-
E. Albert, M. Hanus, F. Huch, J. Oliver, and G. Vidal. Operational semantics for declarative multi-paradigm languages. Journal of Symbolic Computation, 2004.
-
(2004)
Journal of Symbolic Computation
-
-
Albert, E.1
Hanus, M.2
Huch, F.3
Oliver, J.4
Vidal, G.5
-
6
-
-
84867789527
-
Data protection by logic programming
-
Proc. 1st International Conference on Computational Logic. Springer-Verlag
-
S. Barker. Data protection by logic programming. In Proc. 1st International Conference on Computational Logic, volume 1861 of LNAI, pages 1300-1314. Springer-Verlag, 2000.
-
(2000)
LNAI
, vol.1861
, pp. 1300-1314
-
-
Barker, S.1
-
7
-
-
11244252943
-
Protecting deductive databases from unauthorized retrieval and update requests
-
S. Barker. Protecting deductive databases from unauthorized retrieval and update requests. Journal of Data and Knowledge Engineering, 23(3):231-285, 2002.
-
(2002)
Journal of Data and Knowledge Engineering
, vol.23
, Issue.3
, pp. 231-285
-
-
Barker, S.1
-
8
-
-
33746666258
-
Efficient and flexible access control via jones optimality logic program specialisation
-
To Appear
-
S. Barker, M. Leuschel, and M. Varea. Efficient and flexible access control via jones optimality logic program specialisation. HOSC, To Appear, 2006.
-
(2006)
HOSC
-
-
Barker, S.1
Leuschel, M.2
Varea, M.3
-
9
-
-
3042584122
-
Flexible access control policy specification with constraint logic programming
-
S. Barker and P. Stuckey. Flexible access control policy specification with constraint logic programming. ACM Trans. on Information and System Security, 6(4):501-546, 2003.
-
(2003)
ACM Trans. on Information and System Security
, vol.6
, Issue.4
, pp. 501-546
-
-
Barker, S.1
Stuckey, P.2
-
10
-
-
33746720635
-
Jakarta: A toolset to reason about the JavaCard platform
-
Proceedings of e-SMART'01. Springer-Verlag
-
G. Barthe, G. Dufay, M. Huisman, and S. Melo de Sousa. Jakarta: a toolset to reason about the JavaCard platform. In Proceedings of e-SMART'01, volume 2140 of Lecture Notes in Computer Science. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2140
-
-
Barthe, G.1
Dufay, G.2
Huisman, M.3
Melo De Sousa, S.4
-
12
-
-
0035790640
-
A logical framework for reasoning about access control models
-
E. Bertino, B. Catania, E. Ferrari, and P. Perlasca. A logical framework for reasoning about access control models. In SACMAT, pages 41-52, 2001.
-
(2001)
SACMAT
, pp. 41-52
-
-
Bertino, E.1
Catania, B.2
Ferrari, E.3
Perlasca, P.4
-
13
-
-
0037190147
-
ELAN from a rewriting logic point of view
-
P. Borovansky, C. Kirchner, H. Kirchner, and P-E. Moreau. ELAN from a rewriting logic point of view. Theoretical Computer Science, 285:155-185, 2002.
-
(2002)
Theoretical Computer Science
, vol.285
, pp. 155-185
-
-
Borovansky, P.1
Kirchner, C.2
Kirchner, H.3
Moreau, P.-E.4
-
14
-
-
84928563923
-
The Maude 2.0 system
-
number 2706 in Lecture Notes in Computer Science. Springer-Verlag
-
M. Clavel, F. Durán, S. Eker, P. Lincoln, N. Martí-Oliet, J. Meseguer, and C. Talcott. The Maude 2.0 system. In Rewriting Techniques and Applications (RTA 2003), number 2706 in Lecture Notes in Computer Science, pages 76-87. Springer-Verlag, 2003.
-
(2003)
Rewriting Techniques and Applications (RTA 2003)
, pp. 76-87
-
-
Clavel, M.1
Durán, F.2
Eker, S.3
Lincoln, P.4
Martí-Oliet, N.5
Meseguer, J.6
Talcott, C.7
-
16
-
-
0038343548
-
Access control: Principles and solutions
-
S. De Capitani di Vimercati, S. Paraboschi, and P. Samarati. Access control: principles and solutions. Softw., Pract. Exper., 33(5):397-421, 2003.
-
(2003)
Softw., Pract. Exper.
, vol.33
, Issue.5
, pp. 397-421
-
-
De Capitani Di Vimercati, S.1
Paraboschi, S.2
Samarati, P.3
-
20
-
-
15544365037
-
Reachability analysis over term rewriting systems
-
G. Feuillade, T. Genet, and V. Viet Triem Tong. Reachability Analysis over Term Rewriting Systems. JAR, 33 (3-4):341-383, 2004.
-
(2004)
JAR
, vol.33
, Issue.3-4
, pp. 341-383
-
-
Feuillade, G.1
Genet, T.2
Viet Triem Tong, V.3
-
22
-
-
0001619596
-
Flexible support for multiple access control policies
-
S. Jajodia, P. Samarati, M. Sapino, and V.S. Subrahmaninan. Flexible support for multiple access control policies. ACM TODS, 26(2):214-260, 2001.
-
(2001)
ACM TODS
, vol.26
, Issue.2
, pp. 214-260
-
-
Jajodia, S.1
Samarati, P.2
Sapino, M.3
Subrahmaninan, V.S.4
-
24
-
-
0001834942
-
Term rewriting systems
-
S. Abramsky, Dov.M. Gabbay, and T.S.E. Maibaum, editors. Oxford University Press
-
J.-W. Klop. Term Rewriting Systems. In S. Abramsky, Dov.M. Gabbay, and T.S.E. Maibaum, editors, Handbook of Logic in Computer Science, volume 2. Oxford University Press, 1992.
-
(1992)
Handbook of Logic in Computer Science
, vol.2
-
-
Klop, J.-W.1
-
25
-
-
0027910814
-
Combinatory reduction systems, introduction and survey
-
J.-W. Klop, V. van Oostrom, and F. van Raamsdonk. Combinatory reduction systems, introduction and survey. Theoretical Computer Science, 121:279-308, 1993.
-
(1993)
Theoretical Computer Science
, vol.121
, pp. 279-308
-
-
Klop, J.-W.1
Van Oostrom, V.2
Van Raamsdonk, F.3
-
29
-
-
0002569005
-
Higher-order rewrite systems and their confluence
-
Richard Mayr and Tobias Nipkow. Higher-order rewrite systems and their confluence. Theoretical Computer Science, 192:3-29, 1998.
-
(1998)
Theoretical Computer Science
, vol.192
, pp. 3-29
-
-
Mayr, R.1
Nipkow, T.2
-
30
-
-
0000187751
-
On theories with a combinatorial definition of equivalence
-
M.H.A. Newman. On theories with a combinatorial definition of equivalence. Annals of Mathematics, 43(2):223-243, 1942.
-
(1942)
Annals of Mathematics
, vol.43
, Issue.2
, pp. 223-243
-
-
Newman, M.H.A.1
|