-
1
-
-
49049095190
-
-
Common Criteria Editorial Board. Common Criteria for Information Technology Security Evaluation. Version 3.1 Revision 1. September 2006. Available from
-
Common Criteria Editorial Board. Common Criteria for Information Technology Security Evaluation. Version 3.1 Revision 1. September 2006. Available from http://www.commoncriteriaportal.org
-
-
-
-
2
-
-
33750050331
-
-
John Wiley & Sons
-
M. Schumacher, E. Fernandez, D. Hybertson, F. Buschmann, and P. Sommerlad. Security Patterns - Integrating Security and Systems Engineering. John Wiley & Sons, 2005.
-
(2005)
Security Patterns - Integrating Security and Systems Engineering
-
-
Schumacher, M.1
Fernandez, E.2
Hybertson, D.3
Buschmann, F.4
Sommerlad, P.5
-
3
-
-
49049099514
-
-
Congress of the United states of America. Sarbanes-Oxley Act of 2002. Available from http://www.access.gpo.gov/
-
Congress of the United states of America. Sarbanes-Oxley Act of 2002. Available from http://www.access.gpo.gov/
-
-
-
-
4
-
-
49049114645
-
-
Congress of the United states of America. Health Insurance Portability and Accountability Act of 1996. Available from http://www.hhs.gov/ocr/hipaa/
-
Congress of the United states of America. Health Insurance Portability and Accountability Act of 1996. Available from http://www.hhs.gov/ocr/hipaa/
-
-
-
-
6
-
-
49049106662
-
Funded by European Commission. Directorate General Information Society & Media
-
SERENITY Project
-
SERENITY Project. Funded by European Commission. Directorate General Information Society & Media. Unit D4-ICT for Trust and Security, under grant IST-027587. http://www.serenity-project.org
-
Unit D4-ICT for Trust and Security, under grant IST-027587
-
-
-
7
-
-
49049094741
-
-
C. A. R. Hoare. Communicating Sequential Process, London: Prentice-Hall International, UK, LTD., 1985.
-
C. A. R. Hoare. "Communicating Sequential Process", London: Prentice-Hall International, UK, LTD., 1985.
-
-
-
-
9
-
-
0028058408
-
A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions
-
IEEE Press. May
-
J. McLean. "A General Theory of Composition for Trace Sets Closed Under Selective Interleaving Functions", Proceedings of the 1994 IEEE Symposium on Security and Privacy. IEEE Press. May 1994.
-
(1994)
Proceedings of the 1994 IEEE Symposium on Security and Privacy
-
-
McLean, J.1
-
11
-
-
0037421091
-
A Comparison of Three Authentication Properties
-
January, Elsevier Science
-
R. Focardi, R. Gorrieri and F. Martinelli. "A Comparison of Three Authentication Properties", Theoretical Computer Science, Volume 291(3), Pages 219-388, January 2003, Elsevier Science.
-
(2003)
Theoretical Computer Science
, vol.291
, Issue.3
, pp. 219-388
-
-
Focardi, R.1
Gorrieri, R.2
Martinelli, F.3
-
12
-
-
84988393004
-
Classification of Security Properties. Part I: Information Flow
-
Foundations of Security Analysis and Design R. Focardi, R. Gorrieri eds, Springer
-
R. Focardi, R. Gorrieri. "Classification of Security Properties. Part I: Information Flow". In Foundations of Security Analysis and Design (R. Focardi, R. Gorrieri eds), LNCS 2171, 331-396, Springer, 2001.
-
(2001)
LNCS
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
13
-
-
3242706680
-
Verifying Persistent Security Properties
-
Elsevier Science
-
A. Bossi, R. Focardi, C. Piazza, and S. Rossi. "Verifying Persistent Security Properties", Computer Languages, Systems and Structures, 30(3-4): 231-258 (2004). Elsevier Science.
-
(2004)
Computer Languages, Systems and Structures
, vol.30
, Issue.3-4
, pp. 231-258
-
-
Bossi, A.1
Focardi, R.2
Piazza, C.3
Rossi, S.4
-
14
-
-
49049103044
-
A Complete Axiomatization of Knowledge and Cryptography
-
Technical Report Trita-CSCTCS-2007:1
-
M. Cohen, M. Dam: "A Complete Axiomatization of Knowledge and Cryptography" Technical Report Trita-CSCTCS-2007:1.
-
-
-
Cohen, M.1
Dam, M.2
-
15
-
-
49049083577
-
Logical Omniscience in the Semantics of BAN Logics
-
Chicago
-
M. Cohen and M. Dam: "Logical Omniscience in the Semantics of BAN Logics", in Proc. FCS'05, Chicago, 2005, pp. 121-132.
-
(2005)
Proc. FCS'05
, pp. 121-132
-
-
Cohen, M.1
Dam, M.2
-
16
-
-
49049085144
-
-
25-29 September, Szeged, Hungary
-
V. Cortier, M. Rusinowitch, E. Zalinescu, Relating two standard notions of secrecy Computer Science Logic 2006 25-29 September, 2006, Szeged, Hungary.
-
(2006)
Relating two standard notions of secrecy Computer Science Logic 2006
-
-
Cortier, V.1
Rusinowitch, M.2
Zalinescu, E.3
-
17
-
-
17744399926
-
On a formal framework for security properties
-
Formal Methods, Techniques and Tools for Secure and Reliable Applications, June
-
S. Gürgens, P. Ochsenschlager, C. Rudolph "On a formal framework for security properties". Computer Standards & Interfaces. Volume 27, Issue 5, June 2005, Pages 457-466. Formal Methods, Techniques and Tools for Secure and Reliable Applications.
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.5
, pp. 457-466
-
-
Gürgens, S.1
Ochsenschlager, P.2
Rudolph, C.3
|