-
1
-
-
84948414101
-
Soft constraints for security protocol analysis: Confidentiality
-
In Proc. PADL'01 Springer
-
G. Bella and S. Bistarelli. Soft constraints for security protocol analysis: Confidentiality. In Proc. PADL'01, volume 1990 of Lecture Notes in Computer Science (LNCS). Springer, 2001.
-
(2001)
Lecture Notes in Computer Science (LNCS)
, vol.1990
-
-
Bella, G.1
Bistarelli, S.2
-
3
-
-
0003400255
-
Integrity considerations for secure computer systems
-
MITRE Corp Bedford MA
-
K. Biba. Integrity considerations for secure computer systems. Technical Report MTR-3153 Rev 1 (ESD-TR-76-372), MITRE Corp Bedford MA, 1976.
-
(1976)
Technical Report MTR-3153 Rev 1 (ESD-TR-76-372)
-
-
Biba, K.1
-
4
-
-
0031095278
-
Semiring-based Constraint Solving and Optimization
-
Mar
-
S. Bistarelli, U. Montanari, and F. Rossi. Semiring-based Constraint Solving and Optimization. Journal of the ACM, 44(2):201-236, Mar 1997.
-
(1997)
Journal of the ACM
, vol.44
, Issue.2
, pp. 201-236
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
5
-
-
84948412454
-
Soft concurrent constraint programming
-
In Proc. ESOP April 6-14, 2002 Grenoble, France Springer-Verlag
-
S. Bistarelli, U. Montanari, and F. Rossi. Soft concurrent constraint programming. In Proc. ESOP, April 6-14, 2002, Grenoble, France, LNCS. Springer-Verlag, 2002.
-
(2002)
LNCS
-
-
Bistarelli, S.1
Montanari, U.2
Rossi, F.3
-
6
-
-
0006782323
-
Constraint-based software for concurrent engineering
-
Jan
-
J. Bowen and D. Bahler. Constraint-based software for concurrent engineering. IEEE Computer, 26(1):66-68, Jan. 1993.
-
(1993)
IEEE Computer
, vol.26
, Issue.1
, pp. 66-68
-
-
Bowen, J.1
Bahler, D.2
-
7
-
-
0023266943
-
A comparison of commercial and military computer security models
-
IEEE Computer Society Press, Apr
-
D. D. Clark and D. R. Wilson. A comparison of commercial and military computer security models. In Proceedings Symposium on Security and Privacy, pages 184-194. IEEE Computer Society Press, Apr. 1987.
-
(1987)
Proceedings Symposium on Security and Privacy
, pp. 184-194
-
-
Clark, D.D.1
Wilson, D.R.2
-
8
-
-
33748435812
-
-
Computer Security Institute/US Federal Bureau of Investigation
-
Computer Security Institute/US Federal Bureau of Investigation. Computer Crime and Security Survey, 2001.
-
(2001)
Computer Crime and Security Survey
-
-
-
10
-
-
33646428027
-
Optimal planning of digital cordless telecommunication systems
-
London, UH
-
T. Fr̈uhwirth and P. Brisset. Optimal planning of digital cordless telecommunication systems. In Proc. PACT97, London, UH, 1997.
-
(1997)
Proc. PACT97
-
-
Fr̈uhwirth, T.1
Brisset, P.2
-
12
-
-
0000959937
-
Constraint satisfaction
-
In S. Shapiro, editor John Wiley & Sons
-
A. Mackworth. Constraint satisfaction. In S. Shapiro, editor, Encyclopedia of AI (second edition), pages 285-293. John Wiley & Sons, 1992.
-
(1992)
Encyclopedia of AI (Second Edition)
, pp. 285-293
-
-
MacKworth, A.1
-
14
-
-
0030086382
-
Role based access control models
-
R. Sandhu et al. Role based access control models. IEEE Computer, 29(2), 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 2
-
-
Sandhu, R.1
|