-
1
-
-
70350060199
-
Flow-Net Methodology for Accountability in Wireless Networks
-
Sept./Oct.
-
Y. Xiao, "Flow-Net Methodology for Accountability in Wireless Networks," IEEE Network, Vol. 23, No. 5, Sept./Oct. 2009, pp. 30-37.
-
(2009)
IEEE Network
, vol.23
, Issue.5
, pp. 30-37
-
-
Xiao, Y.1
-
4
-
-
33745689203
-
Accountability in Electronic Commerce Protocols
-
May
-
R. Kailar, "Accountability in Electronic Commerce Protocols," IEEE Trans. Software Engineering, vol. 22, no. 5, May 1996, pp. 313-28.
-
(1996)
IEEE Trans. Software Engineering
, vol.22
, Issue.5
, pp. 313-328
-
-
Kailar, R.1
-
5
-
-
23044534113
-
Practical Reasoning about Accountability in Electronic Commerce Protocols
-
Dec. 6-7
-
S. Kungpisdan and Y. Permpoontanalarp, "Practical Reasoning about Accountability in Electronic Commerce Protocols," Proc. 4th ICISC '01, vol. 2288, Dec. 6-7, 2001, pp. 268-84.
-
(2001)
Proc. 4th ICISC '01
, vol.2288
, pp. 268-284
-
-
Kungpisdan, S.1
Permpoontanalarp, Y.2
-
7
-
-
0039334688
-
The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-Based Systems
-
Oct.
-
D. S. Wallach, A. W. Appel, and E. W. Felten, "The Security Architecture Formerly Known as Stack Inspection: A Security Mechanism for Language-Based Systems," ACM Trans. Software Eng. and Methodology, vol. 9, no. 4, Oct. 2000, pp. 341-78.
-
(2000)
ACM Trans. Software Eng. and Methodology
, vol.9
, Issue.4
, pp. 341-378
-
-
Wallach, D.S.1
Appel, A.W.2
Felten, E.W.3
-
8
-
-
0037297882
-
Accountable Web-Computing
-
Feb.
-
A. L. Rosenberg, "Accountable Web-Computing," IEEE Trans. Parallel and Distrib. Sys., vol. 14, no. 2, Feb. 2003, pp. 97-106.
-
(2003)
IEEE Trans. Parallel and Distrib. Sys.
, vol.14
, Issue.2
, pp. 97-106
-
-
Rosenberg, A.L.1
-
9
-
-
79551623723
-
Fine-Grain Access Control for Securing Shared Resources in Computational Grids
-
A.R. Butt et al., "Fine-Grain Access Control for Securing Shared Resources in Computational Grids," Proc. IPDPS.
-
Proc. IPDPS
-
-
Butt, A.R.1
-
10
-
-
0027668428
-
Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse
-
Sept.
-
P. Helman and G. Liepins, "Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse," IEEE Trans. Software Eng., vol. 19, no. 9, Sept., 1993, pp. 886-901.
-
(1993)
IEEE Trans. Software Eng.
, vol.19
, Issue.9
, pp. 886-901
-
-
Helman, P.1
Liepins, G.2
-
11
-
-
0003346599
-
Verification Strategies for Establishing Reliability and Validity in Qualitative Research
-
J. M. Morse et al., "Verification Strategies for Establishing Reliability and Validity in Qualitative Research," Int'l. J. Qualitative Methods, vol. 1, no. 2, 2002.
-
(2002)
Int'l. J. Qualitative Methods
, vol.1
, Issue.2
-
-
Morse, J.M.1
-
12
-
-
79551623320
-
Implementing Copyright Limitations in Rights Expression Languages
-
D. K. Mulligan and A. Burstein, "Implementing Copyright Limitations in Rights Expression Languages," 2002 ACM Wksp. Digital Rights Mgmt., Washington, DC, Nov. 18, 2002.
-
2002 ACM Wksp. Digital Rights Mgmt., Washington, DC, Nov. 18, 2002
-
-
Mulligan, D.K.1
Burstein, A.2
-
13
-
-
1942433797
-
Digital Rights Management {and, or, vs.} the Law
-
Apr.
-
P. Samuelson, "Digital Rights Management {and, or, vs.} the Law," Commun. ACM, vol. 46, no. 4, Apr. 2003, pp. 41-45.
-
(2003)
Commun. ACM
, vol.46
, Issue.4
, pp. 41-45
-
-
Samuelson, P.1
-
14
-
-
56449096542
-
-
Cisco IOS NetFlow, http://www.cisco.com/en/US/products/ps6601/products- ios-protocol-group-home.html
-
Cisco IOS NetFlow
-
-
-
15
-
-
77955713637
-
IEEE 802.11 User Fingerprinting and Its Applications
-
accepted and to appear. doi:10.1016/j.camwa.2010.01.002
-
D. Takahashi, Y. Xiao, Y. Zhang, P. Chatzimisios, and H.-H. Chen, "IEEE 802.11 User Fingerprinting and Its Applications," Computers and Mathematics with Applications, accepted and to appear. doi:10.1016/j.camwa.2010. 01.002
-
Computers and Mathematics with Applications
-
-
Takahashi, D.1
Xiao, Y.2
Zhang, Y.3
Chatzimisios, P.4
Chen, H.-H.5
|