-
1
-
-
84868079363
-
-
Available from, December 4
-
Stein Bagger. Available from http://en.wikipedia.org/wiki/Stein-Bagger, last visited December 4, 2008.
-
(2008)
Bagger, last visited
-
-
Bagger, S.1
-
4
-
-
34548836760
-
The Architecture Analysis and Design Language (AADL): An Introduction
-
Technical report, CMU/SEI
-
P. H. Feiler, D. P. Gluch, and J. J. Hudak. The Architecture Analysis and Design Language (AADL): An Introduction. Technical report, CMU/SEI, 2006.
-
(2006)
-
-
Feiler, P.H.1
Gluch, D.P.2
Hudak, J.J.3
-
5
-
-
74549137028
-
-
Gorla and Pugliese. Resource access and mobility control with dynamic privileges acquisition. In ICALP: Annual International Colloquium on Automata, Languages and Programming, 2003.
-
Gorla and Pugliese. Resource access and mobility control with dynamic privileges acquisition. In ICALP: Annual International Colloquium on Automata, Languages and Programming, 2003.
-
-
-
-
6
-
-
74549225879
-
-
Master's thesis, Informatics and Mathematical Modelling, Technical University of Denmark, DTU, Richard Petersens Plads, Building, DK-2800 Kgs. Lyngby, Supervised by Christian W. Probst, IMM, DTU
-
D. Gunnarsson. Static analysis of the insider problem. Master's thesis, Informatics and Mathematical Modelling, Technical University of Denmark, DTU, Richard Petersens Plads, Building 321, DK-2800 Kgs. Lyngby, 2007. Supervised by Christian W. Probst, IMM, DTU.
-
(2007)
Static analysis of the insider problem
, pp. 321
-
-
Gunnarsson, D.1
-
7
-
-
33750949205
-
Sandboxing in myKlaim
-
Vienna, Austria, Apr, IEEE Computer Society
-
R. R. Hansen, C. W. Probst, and F. Nielson. Sandboxing in myKlaim. In The First International Conference on Availability, Reliability and Security, ARES'06, Vienna, Austria, Apr. 2006. IEEE Computer Society.
-
(2006)
The First International Conference on Availability, Reliability and Security, ARES'06
-
-
Hansen, R.R.1
Probst, C.W.2
Nielson, F.3
-
9
-
-
0017996760
-
Time, clocks, and the ordering of events in a distributed system
-
July
-
L. Lamport. Time, clocks, and the ordering of events in a distributed system. Communications of the ACM, 21(7):558-565, July 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.7
, pp. 558-565
-
-
Lamport, L.1
-
10
-
-
0000372791
-
KLAIM: A Kernel Language for Agents Interaction and Mobility
-
May
-
R. D. Nicola, G. Ferrari, and R. Pugliese. KLAIM: a Kernel Language for Agents Interaction and Mobility. IEEE Transactions on Software Engineering, 24(5):315-330, May 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.24
, Issue.5
, pp. 315-330
-
-
Nicola, R.D.1
Ferrari, G.2
Pugliese, R.3
-
11
-
-
45749115403
-
From flow logic to static type systems for coordination languages
-
D. Lea and G. Zavattaro, editors, COORDINATION, of, Springer
-
R. D. Nicola, D. Gorla, R. R. Hansen, F. Nielson, H. R. Nielson, C. W. Probst, and R. Pugliese. From flow logic to static type systems for coordination languages. In D. Lea and G. Zavattaro, editors, COORDINATION, volume 5052 of Lecture Notes in Computer Science, pages 100-116. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5052
, pp. 100-116
-
-
Nicola, R.D.1
Gorla, D.2
Hansen, R.R.3
Nielson, F.4
Nielson, H.R.5
Probst, C.W.6
Pugliese, R.7
-
14
-
-
38149049950
-
Where can an insider attack?
-
T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, editors, Formal Aspects in Security and Trust, of, Springer
-
C. W. Probst, R. R. Hansen, and F. Nielson. Where can an insider attack? In T. Dimitrakos, F. Martinelli, P. Y. A. Ryan, and S. A. Schneider, editors, Formal Aspects in Security and Trust, volume 4691 of Lecture Notes in Computer Science, pages 127-142. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4691
, pp. 127-142
-
-
Probst, C.W.1
Hansen, R.R.2
Nielson, F.3
-
15
-
-
74549217567
-
A trader's secrets, a bank's missteps
-
February 5
-
N. D. Schwartz and K. Bennhold. A trader's secrets, a bank's missteps. New York Times, February 5, 2009.
-
(2009)
New York Times
-
-
Schwartz, N.D.1
Bennhold, K.2
-
16
-
-
84964504906
-
Computer-attack graph generation tool
-
L. P. Swiler, C. Phillips, D. Ellis, and S. Chakerian. Computer-attack graph generation tool. DARPA Information Survivability Conference and Exposition,, 2:1307, 2001.
-
(2001)
DARPA Information Survivability Conference and Exposition
, vol.2
, pp. 1307
-
-
Swiler, L.P.1
Phillips, C.2
Ellis, D.3
Chakerian, S.4
|