-
1
-
-
84866391692
-
Automatic information flow analysis of business process models
-
Springer, Heidelberg, Germany
-
R. Accorsi, A. Lehmann, Automatic information flow analysis of business process models, in: BPM 2012, Lecture Notes in Computer Science, vol. 7481, Springer, Heidelberg, Germany, 2012, pp. 172-187.
-
(2012)
BPM 2012, Lecture Notes in Computer Science
, vol.7481
, pp. 172-187
-
-
Accorsi, R.1
Lehmann, A.2
-
2
-
-
81455142699
-
Vulnerability analysis in SOA-based business processes
-
L. Lowis, and R. Accorsi Vulnerability analysis in SOA-based business processes IEEE Trans. Serv. Comput. 4 3 2011 230 242
-
(2011)
IEEE Trans. Serv. Comput.
, vol.4
, Issue.3
, pp. 230-242
-
-
Lowis, L.1
Accorsi, R.2
-
3
-
-
84908165983
-
-
ISO/IEC, ISO/IEC Information Security Management System 27001, 2005
-
ISO/IEC, ISO/IEC Information Security Management System 27001, 2005 〈 www.27000.org/iso-27001.htm 〉.
-
-
-
-
4
-
-
84908165982
-
-
DoD, Trusted computer security evaluation criteria, 1983
-
DoD, Trusted computer security evaluation criteria, 1983 〈 http://csrc.nist.gov/publications/histroy/dod85.pdf 〉.
-
-
-
-
5
-
-
84861031279
-
Automated analysis of infinite state workflows with access control policies
-
C. Meadows, C. Fernandez-Gago, Springer Berlin, Heidelberg
-
A. Armando, and S. Ranise Automated analysis of infinite state workflows with access control policies C. Meadows, C. Fernandez-Gago, Security and Trust Management, Lecture Notes in Computer Science vol. 7170 2012 Springer Berlin, Heidelberg 157 174
-
(2012)
Security and Trust Management, Lecture Notes in Computer Science
, vol.7170
, pp. 157-174
-
-
Armando, A.1
Ranise, S.2
-
6
-
-
0035750945
-
A Chinese wall security model for decentralized workflow systems
-
ACM, New York, NY, USA
-
V. Atluri, S.A. Chun, P. Mazzoleni, A Chinese wall security model for decentralized workflow systems, in: Proceedings of the 8th ACM Conference on Computer and Communications Security, CCS '01, ACM, New York, NY, USA, 2001, pp. 48-57.
-
(2001)
Proceedings of the 8th ACM Conference on Computer and Communications Security, CCS '01
, pp. 48-57
-
-
Atluri, V.1
Chun, S.A.2
Mazzoleni, P.3
-
7
-
-
63249084376
-
Verification of workflow processes under multilevel security considerations
-
2008. CRiSIS '08
-
K. Barkaoui, R. Ben Ayed, H. Boucheneb, A. Hicheur, Verification of workflow processes under multilevel security considerations, in: Third International Conference on Risks and Security of Internet and Systems, 2008. CRiSIS '08, 2008, pp. 77-84.
-
(2008)
Third International Conference on Risks and Security of Internet and Systems
, pp. 77-84
-
-
Barkaoui, K.1
Ben Ayed, R.2
Boucheneb, H.3
Hicheur, A.4
-
8
-
-
70649112133
-
Verifying information flow control over unbounded processes
-
FM '09, Springer-Verlag, Berlin, Heidelberg
-
W.R. Harris, N.A. Kidd, S. Chaki, S. Jha, T. Reps, Verifying information flow control over unbounded processes, in: Proceedings of the 2nd World Congress on Formal Methods, FM '09, Springer-Verlag, Berlin, Heidelberg, 2009, pp. 773-789.
-
(2009)
Proceedings of the 2nd World Congress on Formal Methods
, pp. 773-789
-
-
Harris, W.R.1
Kidd, N.A.2
Chaki, S.3
Jha, S.4
Reps, T.5
-
9
-
-
84857260231
-
Runtime enforcement of information flow security in tree manipulating processes
-
G. Barthe, B. Livshits, R. Scandariato, Springer Berlin, Heidelberg
-
M. Kovács, and H. Seidl Runtime enforcement of information flow security in tree manipulating processes G. Barthe, B. Livshits, R. Scandariato, Engineering Secure Software and Systems, Lecture Notes in Computer Science vol. 7159 2012 Springer Berlin, Heidelberg 46 59
-
(2012)
Engineering Secure Software and Systems, Lecture Notes in Computer Science
, vol.7159
, pp. 46-59
-
-
Kovács, M.1
Seidl, H.2
-
10
-
-
64249086031
-
Security analysis of electronic business processes
-
S. Röhrig, and K. Knorr Security analysis of electronic business processes Electron. Commer. Res. 4 2004 59 81
-
(2004)
Electron. Commer. Res.
, vol.4
, pp. 59-81
-
-
Röhrig, S.1
Knorr, K.2
-
11
-
-
0017517624
-
Certification of programs for secure information flow
-
D.E. Denning, and P.J. Denning Certification of programs for secure information flow Commun. ACM 20 7 1977 504 513
-
(1977)
Commun. ACM
, vol.20
, Issue.7
, pp. 504-513
-
-
Denning, D.E.1
Denning, P.J.2
-
12
-
-
70349373797
-
Petri net transformations for business processes - A survey
-
ToPNoC II
-
N. Lohmann, H. Verbeek, R.M. Dijkman, Petri net transformations for business processes - a survey, in: Lecture Notes in Computer Science, ToPNoC II, vol. 5460, 2009, pp. 46-63.
-
(2009)
Lecture Notes in Computer Science
, vol.5460
, pp. 46-63
-
-
Lohmann, N.1
Verbeek, H.2
Dijkman, R.M.3
-
13
-
-
74049123448
-
Structural non-interference in elementary and trace nets
-
N. Busi, and R. Gorrieri Structural non-interference in elementary and trace nets Math. Struct. Comput. Sci. 19 6 2009 1065 1090
-
(2009)
Math. Struct. Comput. Sci.
, vol.19
, Issue.6
, pp. 1065-1090
-
-
Busi, N.1
Gorrieri, R.2
-
14
-
-
79959293472
-
Strong non-leak guarantees for workflow models
-
W.C. Chu, W.E. Wong, M.J. Palakal, C.-C. Hung (Eds.)
-
R. Accorsi, C. Wonnemann, Strong non-leak guarantees for workflow models, in: W.C. Chu, W.E. Wong, M.J. Palakal, C.-C. Hung (Eds.), SAC, ACM, USA, 2011, pp. 308-314.
-
(2011)
SAC, ACM, USA
, pp. 308-314
-
-
Accorsi, R.1
Wonnemann, C.2
-
15
-
-
80455144533
-
SWAT: A security workflow toolkit for reliably secure process-aware information systems
-
IEEE, USA
-
R. Accorsi, C. Wonnemann, S. Dochow, SWAT: A security workflow toolkit for reliably secure process-aware information systems, in: ARES 2011, IEEE, USA, 2011, pp. 692-697.
-
(2011)
ARES 2011
, pp. 692-697
-
-
Accorsi, R.1
Wonnemann, C.2
Dochow, S.3
-
16
-
-
67650649695
-
Petri net security checker: Structural non-interference at work
-
Springer, Heidelberg
-
S. Frau, R. Gorrieri, C. Ferigato, Petri net security checker: structural non-interference at work, in: FAST 2008, Lecture Notes in Computer Science, vol. 5491, Springer, Heidelberg, 2008, pp. 210-225.
-
(2008)
FAST 2008, Lecture Notes in Computer Science
, vol.5491
, pp. 210-225
-
-
Frau, S.1
Gorrieri, R.2
Ferigato, C.3
-
17
-
-
0024645936
-
Petri nets properties, analysis and applications
-
T. Murata Petri nets properties, analysis and applications Proc. IEEE 77 4 1989 541 580
-
(1989)
Proc. IEEE
, vol.77
, Issue.4
, pp. 541-580
-
-
Murata, T.1
-
18
-
-
38149062061
-
Generating Petri net state spaces
-
J. Kleijn, A. Yakovlev, Springer Heidelberg
-
K. Wolf Generating Petri net state spaces J. Kleijn, A. Yakovlev, ICATPN 2007, Lecture Notes in Computer Science vol. 4546 2007 Springer Heidelberg 29 42
-
(2007)
ICATPN 2007, Lecture Notes in Computer Science
, vol.4546
, pp. 29-42
-
-
Wolf, K.1
-
19
-
-
84873122948
-
Modeling wizard for confidential business processes
-
R. Accorsi, R. Matulevicius (Eds.) Tallinn, 3 September 2012, Proceedings LNBIP
-
A. Lehmann, N. Lohmann, Modeling wizard for confidential business processes, in: R. Accorsi, R. Matulevicius (Eds.), 1st Joint International Workshop on Security in Business Processes (SBP'12), Tallinn, 3 September 2012, Proceedings, 2012, LNBIP, 10.1007/978-3-642-36285-9-67.
-
(2012)
1st Joint International Workshop on Security in Business Processes (SBP'12)
-
-
Lehmann, A.1
Lohmann, N.2
-
20
-
-
0015672289
-
A note on the confinement problem
-
B. Lampson A note on the confinement problem Commun. ACM 16 10 1973 613 615
-
(1973)
Commun. ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.1
-
22
-
-
74049152260
-
Hey, you, get off of my cloud exploring information leakage in third-party compute clouds
-
E. Al-Shaer, S. Jha, A.D. Keromytis, ACM USA
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage Hey, you, get off of my cloud exploring information leakage in third-party compute clouds E. Al-Shaer, S. Jha, A.D. Keromytis, ACM Conference on Computer and Communications Security 2009 ACM USA 199 212
-
(2009)
ACM Conference on Computer and Communications Security
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
23
-
-
84875146484
-
Virtualization issues, security threats, and solutions
-
M. Pearce, S. Zeadally, and R. Hunt Virtualization issues, security threats, and solutions ACM Comput. Surv. 45 2 2013 17:1 17:39
-
(2013)
ACM Comput. Surv.
, vol.45
, Issue.2
, pp. 171-1739
-
-
Pearce, M.1
Zeadally, S.2
Hunt, R.3
-
24
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
IEEE, USA
-
S. Chen, R. Wang, X. Wang, K. Zhang, Side-channel leaks in web applications: a reality today, a challenge tomorrow, in: IEEE Symposium on Security and Privacy, IEEE, USA, 2010, pp. 191-206.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 191-206
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
25
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
S. Subashini, and V. Kavitha A survey on security issues in service delivery models of cloud computing J. Netw. Comput. Appl. 34 1 2011 1 11
-
(2011)
J. Netw. Comput. Appl.
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
27
-
-
84908165980
-
On process rewriting for business process security
-
CEUR-WS.org
-
R. Accorsi, On process rewriting for business process security, in: International Symposium on Data-driven Process Discovery and Analysis, CEUR Workshop Proceedings, CEUR-WS.org, vol. 1027, 2013, pp. 111-126.
-
(2013)
International Symposium on Data-driven Process Discovery and Analysis, CEUR Workshop Proceedings
, vol.1027
, pp. 111-126
-
-
Accorsi, R.1
-
28
-
-
80054075640
-
Indico information flow analysis of business processes for confidentiality requirements
-
J. Cuéllar, J. Lopez, G. Barthe, A. Pretschner, Springer
-
R. Accorsi, and C. Wonnemann Indico information flow analysis of business processes for confidentiality requirements J. Cuéllar, J. Lopez, G. Barthe, A. Pretschner, STM, Lecture Notes in Computer Science vol. 6710 2010 Springer 194 209
-
(2010)
STM, Lecture Notes in Computer Science
, vol.6710
, pp. 194-209
-
-
Accorsi, R.1
Wonnemann, C.2
-
29
-
-
0016949746
-
A lattice model of secure information flow
-
D.E. Denning A lattice model of secure information flow Commun. ACM 19 5 1976 236 243
-
(1976)
Commun. ACM
, vol.19
, Issue.5
, pp. 236-243
-
-
Denning, D.E.1
-
33
-
-
0002719897
-
The application of Petri nets to workflow management
-
W.M.P.v.d. Aalst The application of Petri nets to workflow management J. Circuits Syst. Comput. 8 1 1998 21 66
-
(1998)
J. Circuits Syst. Comput.
, vol.8
, Issue.1
, pp. 21-66
-
-
Aalst, W.M.P.V.D.1
-
34
-
-
84988393004
-
Classification of security properties (Part i: Information flow)
-
R. Focardi, R. Gorrieri, Springer Heidelberg, Germany
-
R. Focardi, and R. Gorrieri Classification of security properties (Part i: Information flow) R. Focardi, R. Gorrieri, FOSAD, Lecture Notes in Computer Science vol. 2171 2000 Springer Heidelberg, Germany 331 396
-
(2000)
FOSAD, Lecture Notes in Computer Science
, vol.2171
, pp. 331-396
-
-
Focardi, R.1
Gorrieri, R.2
-
36
-
-
84857723938
-
On intransitive non-interference in some models of concurrency
-
A. Aldini, R. Gorrieri, Springer Berlin, Heidelberg
-
R. Gorrieri, and M. Vernali On intransitive non-interference in some models of concurrency A. Aldini, R. Gorrieri, Foundations of Security Analysis and Design VI, Lecture Notes in Computer Science vol. 6858 2011 Springer Berlin, Heidelberg 125 151
-
(2011)
Foundations of Security Analysis and Design VI, Lecture Notes in Computer Science
, vol.6858
, pp. 125-151
-
-
Gorrieri, R.1
Vernali, M.2
-
37
-
-
78049296490
-
How to implement a theory of correctness in the area of business processes and services
-
R. Hull, J. Mendling, S. Tai (Eds.), Business Process Management, 8th International Conference, BPM 2010, Hoboken, NJ, USA, September 14-16, 2010 Springer-Verlag
-
N. Lohmann, K. Wolf, How to implement a theory of correctness in the area of business processes and services, in: R. Hull, J. Mendling, S. Tai (Eds.), Business Process Management, 8th International Conference, BPM 2010, Hoboken, NJ, USA, September 14-16, 2010, Proceedings, Lecture Notes in Computer Science, vol. 6336, Springer-Verlag, 2010, pp. 61-77.
-
(2010)
Proceedings, Lecture Notes in Computer Science
, vol.6336
, pp. 61-77
-
-
Lohmann, N.1
Wolf, K.2
-
38
-
-
84866371154
-
The Petri Net API: A collection of Petri net-related functions
-
M. Schwarick, M. Heiner (Eds.) Cottbus, Germany, October 7-8, 2010, CEUR Workshop Proceedings, CEUR-WS.org
-
N. Lohmann, S. Mennicke, C. Sura, The Petri Net API: a collection of Petri net-related functions, in: M. Schwarick, M. Heiner (Eds.), Proceedings of the 17th German Workshop on Algorithms and Tools for Petri Nets (AWPN 2010), Cottbus, Germany, October 7-8, 2010, CEUR Workshop Proceedings, CEUR-WS.org, vol. 643, 2010, pp. 148-155.
-
(2010)
Proceedings of the 17th German Workshop on Algorithms and Tools for Petri Nets (AWPN 2010)
, vol.643
, pp. 148-155
-
-
Lohmann, N.1
Mennicke, S.2
Sura, C.3
-
39
-
-
79955656399
-
Analysis on demand instantaneous soundness checking of industrial business process models
-
D. Fahland, C. Favre, J. Koehler, N. Lohmann, H. Völzer, and K. Wolf Analysis on demand instantaneous soundness checking of industrial business process models Data Knowl. Eng. 70 5 2011 448 466
-
(2011)
Data Knowl. Eng.
, vol.70
, Issue.5
, pp. 448-466
-
-
Fahland, D.1
Favre, C.2
Koehler, J.3
Lohmann, N.4
Völzer, H.5
Wolf, K.6
-
40
-
-
80054978864
-
Security for workflow systems
-
M. Gertz, S. Jajodia, Springer US
-
V. Atluri, and J. Warner Security for workflow systems M. Gertz, S. Jajodia, Handbook of Database Security 2008 Springer US 213 230
-
(2008)
Handbook of Database Security
, pp. 213-230
-
-
Atluri, V.1
Warner, J.2
-
41
-
-
34249781371
-
Secured information flow for asynchronous sequential processes
-
I. Attali, D. Caromel, L. Henrio, and F.L. Del Aguila Secured information flow for asynchronous sequential processes Electron. Notes Theor. Comput. Sci. 180 1 2007 17 34
-
(2007)
Electron. Notes Theor. Comput. Sci.
, vol.180
, Issue.1
, pp. 17-34
-
-
Attali, I.1
Caromel, D.2
Henrio, L.3
Del Aguila, F.L.4
-
42
-
-
27544484252
-
A role-based access control policy verification framework for real-time systems
-
WORDS '05, IEEE Computer Society, Washington, DC, USA
-
B. Shafiq, A. Masood, J. Joshi, A. Ghafoor, A role-based access control policy verification framework for real-time systems, in: Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems, WORDS '05, IEEE Computer Society, Washington, DC, USA, 2005, pp. 13-20.
-
(2005)
Proceedings of the 10th IEEE International Workshop on Object-Oriented Real-Time Dependable Systems
, pp. 13-20
-
-
Shafiq, B.1
Masood, A.2
Joshi, J.3
Ghafoor, A.4
-
43
-
-
58049116112
-
Authorization policy based business collaboration reliability verification
-
A. Bouguettaya, I. Krüger, T. Margaria (Eds.)
-
H. Sun, X. Wang, J. Yang, Y. Zhang, Authorization policy based business collaboration reliability verification, in: A. Bouguettaya, I. Krüger, T. Margaria (Eds.), International Conference on Service-Oriented Computing, Lecture Notes in Computer Science, vol. 5364, 2008, pp. 579-584.
-
(2008)
International Conference on Service-Oriented Computing, Lecture Notes in Computer Science
, vol.5364
, pp. 579-584
-
-
Sun, H.1
Wang, X.2
Yang, J.3
Zhang, Y.4
-
44
-
-
84867342186
-
SOAC-Net a model to manage service-based business process authorization
-
L.E. Moser, M. Parashar, P.C.K. Hung, IEEE USA
-
H. Sun, J. Yang, W. Zhao, and S. Nepal SOAC-Net a model to manage service-based business process authorization L.E. Moser, M. Parashar, P.C.K. Hung, IEEE International Conference on Services Computing 2012 IEEE USA 376 383
-
(2012)
IEEE International Conference on Services Computing
, pp. 376-383
-
-
Sun, H.1
Yang, J.2
Zhao, W.3
Nepal, S.4
-
45
-
-
40249115100
-
Verification of strict integrity policy via Petri nets
-
2006. ICSNC '06
-
Z.-L. Zhang, F. Hong, H.-J. Xiao, Verification of strict integrity policy via Petri nets, in: International Conference on Systems and Networks Communications, 2006. ICSNC '06, 2006, p. 23.
-
(2006)
International Conference on Systems and Networks Communications
, pp. 23
-
-
Zhang, Z.-L.1
Hong, F.2
Xiao, H.-J.3
-
46
-
-
80052886058
-
Formal specification and verification of modular security policy based on colored Petri nets
-
H. Huang, and H. Kirchner Formal specification and verification of modular security policy based on colored Petri nets IEEE Trans. Dependable Secur. Comput. 8 2011 852 865
-
(2011)
IEEE Trans. Dependable Secur. Comput.
, vol.8
, pp. 852-865
-
-
Huang, H.1
Kirchner, H.2
-
47
-
-
65049092304
-
Using colored Petri nets to model and analyze workflow with separation of duty constraints
-
Y. Lu, L. Zhang, and J. Sun Using colored Petri nets to model and analyze workflow with separation of duty constraints J. Adv. Manuf. Technol. 40 2009 179 192
-
(2009)
J. Adv. Manuf. Technol.
, Issue.40
, pp. 179-192
-
-
Lu, Y.1
Zhang, L.2
Sun, J.3
-
48
-
-
78650703724
-
Towards a usage control policy specification with Petri nets
-
R. Meersman, T.S. Dillon, P. Herrero, Springer
-
B. Katt, X. Zhang, and M. Hafner Towards a usage control policy specification with Petri nets R. Meersman, T.S. Dillon, P. Herrero, OTM Conferences (2), Lecture Notes in Computer Science vol. 5871 2009 Springer 905 912
-
(2009)
OTM Conferences (2), Lecture Notes in Computer Science
, vol.5871
, pp. 905-912
-
-
Katt, B.1
Zhang, X.2
Hafner, M.3
-
49
-
-
84856273290
-
Automated certification for compliant cloud-based business processes
-
R. Accorsi, L. Lowis, and Y. Sato Automated certification for compliant cloud-based business processes Bus. Inf. Syst. Eng. 3 3 2011 145 154
-
(2011)
Bus. Inf. Syst. Eng.
, vol.3
, Issue.3
, pp. 145-154
-
-
Accorsi, R.1
Lowis, L.2
Sato, Y.3
-
52
-
-
84883001875
-
Detective information flow analysis for business processes
-
W. Abramowicz, L.A. Maciaszek, R. Kowalczyk, A. Speck
-
R. Accorsi, and C. Wonnemann Detective information flow analysis for business processes W. Abramowicz, L.A. Maciaszek, R. Kowalczyk, A. Speck, Business Process, Services Computing and Intelligent Service Management, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik vol. 147 2009 223 224
-
(2009)
Business Process, Services Computing and Intelligent Service Management, Lecture Notes in Informatics (LNI), Gesellschaft für Informatik
, vol.147
, pp. 223-224
-
-
Accorsi, R.1
Wonnemann, C.2
-
53
-
-
84861600327
-
Secure information flow awareness for smart wireless ehealth systems
-
Signals and Devices (SSD)
-
S. Pfeiffer, S. Unger, D. Timmermann, A. Lehmann, Secure information flow awareness for smart wireless ehealth systems, in: 2012 9th International Multi-Conference on Systems, Signals and Devices (SSD), 2012, pp. 1-6.
-
(2012)
2012 9th International Multi-Conference on Systems
, pp. 1-6
-
-
Pfeiffer, S.1
Unger, S.2
Timmermann, D.3
Lehmann, A.4
-
54
-
-
84863590198
-
On the exploitation of process mining for security audits the conformance checking case
-
S. Ossowski, P. Lecca, ACM USA
-
R. Accorsi, and T. Stocker On the exploitation of process mining for security audits the conformance checking case S. Ossowski, P. Lecca, SAC 2012 ACM USA 1709 1716
-
(2012)
SAC
, pp. 1709-1716
-
-
Accorsi, R.1
Stocker, T.2
-
55
-
-
84859323837
-
On the decidability of non interference over unbounded Petri nets
-
K. Chatzikokolakis, V. Cortier (Eds.)
-
E. Best, P. Darondeau, R. Gorrieri, On the decidability of non interference over unbounded Petri nets, in: K. Chatzikokolakis, V. Cortier (Eds.), International Workshop on Security Issues in Concurrency of EPTCS, vol. 51, 2010, pp. 16-33.
-
(2010)
International Workshop on Security Issues in Concurrency of EPTCS
, vol.51
, pp. 16-33
-
-
Best, E.1
Darondeau, P.2
Gorrieri, R.3
-
56
-
-
0003047591
-
Stubborn sets for reduced state space generation
-
Springer, Heidelberg, Germany
-
A. Valmari, Stubborn sets for reduced state space generation, in: APN, Lecture Notes in Computer Science, vol. 483, Springer, Heidelberg, Germany, 1990, pp. 491-515.
-
(1990)
APN, Lecture Notes in Computer Science
, vol.483
, pp. 491-515
-
-
Valmari, A.1
-
57
-
-
84859300236
-
Deciding selective declassification of Petri nets
-
P. Degano, J.D. Guttman, Springer Heidelberg, Germany
-
E. Best, and P. Darondeau Deciding selective declassification of Petri nets P. Degano, J.D. Guttman, Conference on Principles of Security and Trust, Lecture Notes in Computer Science vol. 7215 2012 Springer Heidelberg, Germany 290 308
-
(2012)
Conference on Principles of Security and Trust, Lecture Notes in Computer Science
, vol.7215
, pp. 290-308
-
-
Best, E.1
Darondeau, P.2
|